First published: Tue Mar 26 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context Indirection (*) is of lower precedence than postfix increment (++). Logic in napi_poll context would cause an out-of-bound read by first increment the pointer address by byte address space and then dereference the value. Rather, the intended logic was to dereference first and then increment the underlying value.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.6.15 | 6.6.15 |
redhat/kernel | <6.7.3 | 6.7.3 |
redhat/kernel | <6.8 | 6.8 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 6.12.11-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52626 has been classified as a high severity vulnerability in the Linux kernel.
To fix CVE-2023-52626, update the kernel package to version 6.6.15, 6.7.3, 6.8, or a specific Debian kernel version as detailed in the affected software list.
CVE-2023-52626 affects various Linux kernel versions, specifically those prior to the patched releases mentioned.
CVE-2023-52626 involves an operation precedence bug in the Linux kernel resulting in an out-of-bounds read.
CVE-2023-52626 is related to a local context issue and is not primarily a remote exploit vulnerability.