CVE-2023-52746

Source
https://cve.org/CVERecord?id=CVE-2023-52746
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52746.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52746
Downstream
Related
Published
2024-05-21T15:23:07.255Z
Modified
2026-04-11T12:46:35.567286Z
Severity
  • 2.5 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
xfrm/compat: prevent potential spectre v1 gadget in xfrm_xlate32_attr()
Details

In the Linux kernel, the following vulnerability has been resolved:

xfrm/compat: prevent potential spectre v1 gadget in xfrmxlate32attr()

int type = nla_type(nla);

if (type > XFRMA_MAX) { return -EOPNOTSUPP; }

@type is then used as an array index and can be used as a Spectre v1 gadget.

if (nlalen(nla) < compatpolicy[type].len) {

arrayindexnospec() can be used to prevent leaking content of kernel memory to malicious users.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52746.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5106f4a8acff480e244300bc5097c0ad7048c3a2
Fixed
a893cc644812728e86e9aff517fd5698812ecef0
Fixed
5dc688fae6b7be9dbbf5304a3d2520d038e06db5
Fixed
419674224390fca298020fc0751a20812f84b12d
Fixed
b6ee896385380aa621102e8ea402ba12db1cabff

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52746.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.10.0
Fixed
5.10.168
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.94
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.12

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52746.json"