CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
9.8%
In the Linux kernel, the following vulnerability has been resolved: bpf:
fix check for attempt to corrupt spilled pointer When register is spilled
onto a stack as a 1/2/4-byte register, we set slot_type[BPF_REG_SIZE - 1]
(plus potentially few more below it, depending on actual spill size). So to
check if some stack slot has spilled register we need to consult
slot_type[7], not slot_type[0]. To avoid the need to remember and
double-check this in the future, just use is_spilled_reg() helper.
Author | Note |
---|---|
rodrigo-zaiden | USN-6765-1 for linux-oem-6.5 wrongly stated that this CVE was fixed in version 6.5.0-1022.23. The mentioned notice was revoked and the state of the fix for linux-oem-6.5 was recovered to the previous state. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 22.04 | noarch | linux | < 5.15.0-102.112 | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < 6.5.0-41.41 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1057.63 | UNKNOWN |
ubuntu | 23.10 | noarch | linux-aws | < 6.5.0-1021.21 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < 5.15.0-1057.63~20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < 5.15.0-1060.69 | UNKNOWN |
ubuntu | 23.10 | noarch | linux-azure | < 6.5.0-1022.23 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure-5.15 | < 5.15.0-1060.69~20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure-6.5 | < 6.5.0-1022.23~22.04.1 | UNKNOWN |
git.kernel.org/stable/c/2757f17972d87773b3677777f5682510f13c66ef
git.kernel.org/stable/c/40617d45ea05535105e202a8a819e388a2b1f036
git.kernel.org/stable/c/67e6707f07354ed1acb4e65552e97c60cf9d69cf
git.kernel.org/stable/c/8dc15b0670594543c356567a1a45b0182ec63174
git.kernel.org/stable/c/ab125ed3ec1c10ccc36bc98c7a4256ad114a3dae
git.kernel.org/stable/c/fc3e3c50a0a4cac1463967c110686189e4a59104
launchpad.net/bugs/cve/CVE-2023-52462
nvd.nist.gov/vuln/detail/CVE-2023-52462
security-tracker.debian.org/tracker/CVE-2023-52462
ubuntu.com/security/notices/USN-6688-1
ubuntu.com/security/notices/USN-6725-1
ubuntu.com/security/notices/USN-6725-2
ubuntu.com/security/notices/USN-6818-1
ubuntu.com/security/notices/USN-6818-2
ubuntu.com/security/notices/USN-6818-3
ubuntu.com/security/notices/USN-6818-4
ubuntu.com/security/notices/USN-6819-1
ubuntu.com/security/notices/USN-6819-2
ubuntu.com/security/notices/USN-6819-3
ubuntu.com/security/notices/USN-6819-4
www.cve.org/CVERecord?id=CVE-2023-52462