In the Linux kernel, the following vulnerability has been resolved:
ipv4: prevent potential spectre v1 gadget in fibmetricsmatch()
if (!type) continue; if (type > RTAXMAX) return false; ... fival = fi->fib_metrics->metrics[type - 1];
@type being used as an array index, we need to prevent cpu speculation or risk leaking kernel memory content.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52996.json"
}