CVE-2023-52997

Source
https://cve.org/CVERecord?id=CVE-2023-52997
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52997.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52997
Downstream
Related
Published
2025-03-27T16:43:31.164Z
Modified
2026-04-11T12:46:39.569089Z
Summary
ipv4: prevent potential spectre v1 gadget in ip_metrics_convert()
Details

In the Linux kernel, the following vulnerability has been resolved:

ipv4: prevent potential spectre v1 gadget in ipmetricsconvert()

if (!type) continue; if (type > RTAX_MAX) return -EINVAL; ... metrics[type - 1] = val;

@type being used as an array index, we need to prevent cpu speculation or risk leaking kernel memory content.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52997.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
6cf9dfd3bd62edfff69f11c0f111bc261166e4c7
Fixed
ef050cf5fb70d995a0d03244e25179b7c66a924a
Fixed
746db9ec1e672eee13965625ddac0d97e16fa20c
Fixed
34c6142f0df9cd75cba5a7aa9df0960d2854b415
Fixed
d50e7348b44f1e046121ff5be01b7fb6978a1149
Fixed
6850fe301d015a7d2012d1de8caf43dafb7cc2f6
Fixed
1d1d63b612801b3f0a39b7d4467cad0abd60e5c8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52997.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.3.0
Fixed
4.19.272
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.231
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.166
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.91
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52997.json"