CVE-2023-53000

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/03/2025
Last modified:
30/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netlink: prevent potential spectre v1 gadgets<br /> <br /> Most netlink attributes are parsed and validated from<br /> __nla_validate_parse() or validate_nla()<br /> <br /> u16 type = nla_type(nla);<br /> <br /> if (type == 0 || type &gt; maxtype) {<br /> /* error or continue */<br /> }<br /> <br /> @type is then used as an array index and can be used<br /> as a Spectre v1 gadget.<br /> <br /> array_index_nospec() can be used to prevent leaking<br /> content of kernel memory to malicious users.<br /> <br /> This should take care of vast majority of netlink uses,<br /> but an audit is needed to take care of others where<br /> validation is not yet centralized in core netlink functions.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 2.6.15 (including) 5.4.231 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.166 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.91 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.9 (excluding)
cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc5:*:*:*:*:*:*