CVE-2023-52746

Source
https://cve.org/CVERecord?id=CVE-2023-52746
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52746.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52746
Downstream
Related
Published
2024-05-21T15:23:07.255Z
Modified
2026-03-20T12:32:46.190162Z
Severity
  • 2.5 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
xfrm/compat: prevent potential spectre v1 gadget in xfrm_xlate32_attr()
Details

In the Linux kernel, the following vulnerability has been resolved:

xfrm/compat: prevent potential spectre v1 gadget in xfrmxlate32attr()

int type = nla_type(nla);

if (type > XFRMA_MAX) { return -EOPNOTSUPP; }

@type is then used as an array index and can be used as a Spectre v1 gadget.

if (nlalen(nla) < compatpolicy[type].len) {

arrayindexnospec() can be used to prevent leaking content of kernel memory to malicious users.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52746.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5106f4a8acff480e244300bc5097c0ad7048c3a2
Fixed
a893cc644812728e86e9aff517fd5698812ecef0
Fixed
5dc688fae6b7be9dbbf5304a3d2520d038e06db5
Fixed
419674224390fca298020fc0751a20812f84b12d
Fixed
b6ee896385380aa621102e8ea402ba12db1cabff

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52746.json"