CVE-2023-52462

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
23/02/2024
Last modified:
05/11/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bpf: fix check for attempt to corrupt spilled pointer<br /> <br /> When register is spilled onto a stack as a 1/2/4-byte register, we set<br /> slot_type[BPF_REG_SIZE - 1] (plus potentially few more below it,<br /> depending on actual spill size). So to check if some stack slot has<br /> spilled register we need to consult slot_type[7], not slot_type[0].<br /> <br /> To avoid the need to remember and double-check this in the future, just<br /> use is_spilled_reg() helper.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.10.209 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11.0 (including) 5.15.148 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16.0 (including) 6.1.75 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2.0 (including) 6.6.14 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7.0 (including) 6.7.2 (excluding)