First published: Tue May 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: xfrm/compat: prevent potential spectre v1 gadget in xfrm_xlate32_attr() int type = nla_type(nla); if (type > XFRMA_MAX) { return -EOPNOTSUPP; } @type is then used as an array index and can be used as a Spectre v1 gadget. if (nla_len(nla) < compat_policy[type].len) { array_index_nospec() can be used to prevent leaking content of kernel memory to malicious users.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel | ||
Linux Kernel | >=5.10<5.10.168 | |
Linux Kernel | >=5.11<5.15.94 | |
Linux Kernel | >=5.16<6.1.12 | |
Linux Kernel | =6.2-rc1 | |
Linux Kernel | =6.2-rc2 | |
Linux Kernel | =6.2-rc3 | |
Linux Kernel | =6.2-rc4 | |
Linux Kernel | =6.2-rc5 | |
Linux Kernel | =6.2-rc6 | |
Linux Kernel | =6.2-rc7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52746 is classified as a medium severity vulnerability due to its potential exploitation through a Spectre v1 gadget.
To fix CVE-2023-52746, update your Linux kernel to the latest version that includes the patch for this vulnerability.
CVE-2023-52746 affects multiple versions of the Linux kernel, particularly those prior to the implementation of the patch that mitigates this vulnerability.
CVE-2023-52746 is a type of information disclosure vulnerability arising from improper indexing in the xfrm_xlate32_attr function.
Mitigation strategies for CVE-2023-52746 primarily involve kernel updates and monitoring for unusual system behavior.