CVE-2023-52462

Source
https://cve.org/CVERecord?id=CVE-2023-52462
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52462.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-52462
Downstream
Related
Published
2024-02-23T14:46:22.900Z
Modified
2026-03-14T12:16:46.803761Z
Summary
bpf: fix check for attempt to corrupt spilled pointer
Details

In the Linux kernel, the following vulnerability has been resolved:

bpf: fix check for attempt to corrupt spilled pointer

When register is spilled onto a stack as a 1/2/4-byte register, we set slottype[BPFREGSIZE - 1] (plus potentially few more below it, depending on actual spill size). So to check if some stack slot has spilled register we need to consult slottype[7], not slot_type[0].

To avoid the need to remember and double-check this in the future, just use isspilledreg() helper.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52462.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
cdd73a5ed0840da88a3b9ad353f568e6f156d417
Fixed
2757f17972d87773b3677777f5682510f13c66ef
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
07c286c10a9cedbd71f20269ff3a4e73d9aab2fe
Fixed
67e6707f07354ed1acb4e65552e97c60cf9d69cf
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
27113c59b6d0a587b29ae72d4ff3f832f58b0651
Fixed
fc3e3c50a0a4cac1463967c110686189e4a59104
Fixed
8dc15b0670594543c356567a1a45b0182ec63174
Fixed
40617d45ea05535105e202a8a819e388a2b1f036
Fixed
ab125ed3ec1c10ccc36bc98c7a4256ad114a3dae

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52462.json"