CVE-2023-52997

Source
https://cve.org/CVERecord?id=CVE-2023-52997
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52997.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52997
Downstream
Related
Published
2025-03-27T16:43:31.164Z
Modified
2026-03-20T12:32:54.236364Z
Summary
ipv4: prevent potential spectre v1 gadget in ip_metrics_convert()
Details

In the Linux kernel, the following vulnerability has been resolved:

ipv4: prevent potential spectre v1 gadget in ipmetricsconvert()

if (!type) continue; if (type > RTAX_MAX) return -EINVAL; ... metrics[type - 1] = val;

@type being used as an array index, we need to prevent cpu speculation or risk leaking kernel memory content.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52997.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
6cf9dfd3bd62edfff69f11c0f111bc261166e4c7
Fixed
ef050cf5fb70d995a0d03244e25179b7c66a924a
Fixed
746db9ec1e672eee13965625ddac0d97e16fa20c
Fixed
34c6142f0df9cd75cba5a7aa9df0960d2854b415
Fixed
d50e7348b44f1e046121ff5be01b7fb6978a1149
Fixed
6850fe301d015a7d2012d1de8caf43dafb7cc2f6
Fixed
1d1d63b612801b3f0a39b7d4467cad0abd60e5c8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52997.json"