CVE-2023-52628

Severity CVSS v4.0:
Pending analysis
Type:
CWE-787 Out-of-bounds Write
Publication date:
28/03/2024
Last modified:
04/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netfilter: nftables: exthdr: fix 4-byte stack OOB write<br /> <br /> If priv-&gt;len is a multiple of 4, then dst[len / 4] can write past<br /> the destination array which leads to stack corruption.<br /> <br /> This construct is necessary to clean the remainder of the register<br /> in case -&gt;len is NOT a multiple of the register size, so make it<br /> conditional just like nft_payload.c does.<br /> <br /> The bug was added in 4.1 cycle and then copied/inherited when<br /> tcp/sctp and ip option support was added.<br /> <br /> Bug reported by Zero Day Initiative project (ZDI-CAN-21950,<br /> ZDI-CAN-21951, ZDI-CAN-21961).

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.1 (including) 5.10.198 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.132 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.54 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.5.4 (excluding)