CVE-2023-52628

Updated: 2025-03-17 21:37:11.145879

Description:

In the Linux kernel, the following vulnerability has been resolved: netfilter: nftables: exthdr: fix 4-byte stack OOB write If priv->len is a multiple of 4, then dst[len / 4] can write past the destination array which leads to stack corruption. This construct is necessary to clean the remainder of the register in case ->len is NOT a multiple of the register size, so make it conditional just like nft_payload.c does. The bug was added in 4.1 cycle and then copied/inherited when tcp/sctp and ip option support was added. Bug reported by Zero Day Initiative project (ZDI-CAN-21950, ZDI-CAN-21951, ZDI-CAN-21961).


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x HIGH 7.1000000000000005

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.1 HIGH Released CLSA-2025:1743193221 2024-09-26 12:49:40
CentOS 6 ELS kernel 2.6.32 7.1 HIGH Ignored 2024-05-15 14:19:43
CentOS 7 ELS kernel 3.10.0 7.1 HIGH Released CLSA-2024:1727167500 2024-10-03 15:39:19
CentOS 8.4 ELS kernel 4.18.0 7.1 HIGH Ignored 2024-05-15 14:19:43
CentOS 8.5 ELS kernel 4.18.0 7.1 HIGH Ignored 2024-05-15 14:19:43
CentOS Stream 8 ELS kernel 4.18.0 7.1 HIGH Ignored 2024-05-15 14:19:43
CloudLinux 6 ELS kernel 2.6.32 7.1 HIGH Ignored 2024-05-15 14:19:43
Oracle Linux 6 ELS kernel 2.6.32 7.1 HIGH Ignored 2024-05-15 14:19:43
RHEL 7 ELS kernel 3.10.0 7.1 HIGH Released CLSA-2025:1750353839 2025-06-20 00:27:47
Ubuntu 16.04 ELS linux-hwe 4.15.0 7.1 HIGH Already Fixed 2025-04-06 03:44:14
Total: 12