First published: Fri Feb 23 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: bpf: fix check for attempt to corrupt spilled pointer When register is spilled onto a stack as a 1/2/4-byte register, we set slot_type[BPF_REG_SIZE - 1] (plus potentially few more below it, depending on actual spill size). So to check if some stack slot has spilled register we need to consult slot_type[7], not slot_type[0]. To avoid the need to remember and double-check this in the future, just use is_spilled_reg() helper.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.8 | 6.8 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 | |
Linux Kernel | <5.10.209 | |
Linux Kernel | >=5.11.0<5.15.148 | |
Linux Kernel | >=5.16.0<6.1.75 | |
Linux Kernel | >=6.2.0<6.6.14 | |
Linux Kernel | >=6.7.0<6.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52462 has been classified as a moderate severity vulnerability in the Linux kernel.
CVE-2023-52462 affects multiple versions of the Linux kernel, particularly those prior to specific patched versions such as 6.1.125 and 5.10.226.
To resolve CVE-2023-52462, update the Linux kernel to the fixed versions provided by your distribution, such as 6.8 for Red Hat or specific versions listed by Debian.
Yes, CVE-2023-52462 addresses an issue in the BPF (Berkeley Packet Filter) subsystem of the Linux kernel.
Yes, CVE-2023-52462 involves a vulnerability that has the potential to corrupt data within the kernel's BPF pointer handling.