CVE-2023-52997
ipv4: prevent potential spectre v1 gadget in ip_metrics_convert()
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In the Linux kernel, the following vulnerability has been resolved: ipv4: prevent potential spectre v1 gadget in ip_metrics_convert() if (!type) continue; if (type > RTAX_MAX) return -EINVAL; ... metrics[type - 1] = val; @type being used as an array index, we need to prevent
cpu speculation or risk leaking kernel memory content.
A vulnerability was found in the Linux kernel's `ip_metrics_convert()` function, where improper handling of user input can potentially leak kernel memory via side channels. This issue is caused by the use of `@type`, a user-controlled input, which is an array within this function. If a CPU speculatively executes instructions past the conditional branch before the branch condition is resolved, the line `metrics[type - 1] = val` may be evaluated. A situation where `type` is out-of-bounds could lead to improper kernel memory access.
In the Linux kernel, the following vulnerability has been resolved: ipv4: prevent potential spectre v1 gadget in ip_metrics_convert() if (!type) continue; if (type > RTAX_MAX) return -EINVAL; ... metrics[type - 1] = val; @type being used as an array index, we need to prevent cpu speculation or risk leaking kernel memory content.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2025-03-27 CVE Reserved
- 2025-03-27 CVE Published
- 2025-04-28 EPSS Updated
- 2025-05-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
https://git.kernel.org/stable/c/6cf9dfd3bd62edfff69f11c0f111bc261166e4c7 | Vuln. Introduced |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2023-52997 | 2023-11-14 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2355468 | 2023-11-14 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 4.3 < 4.19.272 Search vendor "Linux" for product "Linux Kernel" and version " >= 4.3 < 4.19.272" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 4.3 < 5.4.231 Search vendor "Linux" for product "Linux Kernel" and version " >= 4.3 < 5.4.231" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 4.3 < 5.10.166 Search vendor "Linux" for product "Linux Kernel" and version " >= 4.3 < 5.10.166" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 4.3 < 5.15.91 Search vendor "Linux" for product "Linux Kernel" and version " >= 4.3 < 5.15.91" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 4.3 < 6.1.9 Search vendor "Linux" for product "Linux Kernel" and version " >= 4.3 < 6.1.9" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 4.3 < 6.2 Search vendor "Linux" for product "Linux Kernel" and version " >= 4.3 < 6.2" | en |
Affected
|