CVE-2023-52676
Severity CVSS v4.0:
Pending analysis
Type:
CWE-190
Integer Overflow or Wraparound
Publication date:
17/05/2024
Last modified:
25/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bpf: Guard stack limits against 32bit overflow<br />
<br />
This patch promotes the arithmetic around checking stack bounds to be<br />
done in the 64-bit domain, instead of the current 32bit. The arithmetic<br />
implies adding together a 64-bit register with a int offset. The<br />
register was checked to be below 1
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10.33 (including) | 5.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11.17 (including) | 6.6.14 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.7.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1d38a9ee81570c4bd61f557832dead4d6f816760
- https://git.kernel.org/stable/c/ad140fc856f0b1d5e2215bcb6d0cc247a86805a2
- https://git.kernel.org/stable/c/e5ad9ecb84405637df82732ee02ad741a5f782a6
- https://git.kernel.org/stable/c/1d38a9ee81570c4bd61f557832dead4d6f816760
- https://git.kernel.org/stable/c/ad140fc856f0b1d5e2215bcb6d0cc247a86805a2
- https://git.kernel.org/stable/c/e5ad9ecb84405637df82732ee02ad741a5f782a6



