CVE-2023-52996

Source
https://cve.org/CVERecord?id=CVE-2023-52996
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52996.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52996
Downstream
Published
2025-03-27T16:43:30.547Z
Modified
2026-03-12T03:27:52.020183Z
Summary
ipv4: prevent potential spectre v1 gadget in fib_metrics_match()
Details

In the Linux kernel, the following vulnerability has been resolved:

ipv4: prevent potential spectre v1 gadget in fibmetricsmatch()

if (!type) continue; if (type > RTAXMAX) return false; ... fival = fi->fib_metrics->metrics[type - 1];

@type being used as an array index, we need to prevent cpu speculation or risk leaking kernel memory content.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52996.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5f9ae3d9e7e4ad6db0491abc7c4ae5452dbeadd8
Fixed
8f0eb24f1a7a60ce635f0d757a46f1a37a4d467d
Fixed
7f9828fb1f688210e681268490576f0ca65c322a
Fixed
ca3cf947760de050d558293002ad3e7f4b8745d2
Fixed
f9753ebd61be2d957b5504cbd3fd719674f05b7a
Fixed
5e9398a26a92fc402d82ce1f97cc67d832527da0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52996.json"