THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2023-52626

net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context

AssignerLinux
Reserved2024-03-06
Published2024-03-26
Updated2024-05-29

Description

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context Indirection (*) is of lower precedence than postfix increment (++). Logic in napi_poll context would cause an out-of-bound read by first increment the pointer address by byte address space and then dereference the value. Rather, the intended logic was to dereference first and then increment the underlying value.

Product status

Default status
unaffected

e5d30f7da357 before 40e0d0746390
affected

92214be5979c before 33cdeae8c6fb
affected

92214be5979c before 3876638b2c7e
affected

Default status
affected

6.7
affected

Any version before 6.7
unaffected

6.6.15
unaffected

6.7.3
unaffected

6.8
unaffected

References

https://git.kernel.org/stable/c/40e0d0746390c5b0c31144f4f1688d72f3f8d790

https://git.kernel.org/stable/c/33cdeae8c6fb58cc445f859b67c014dc9f60b4e0

https://git.kernel.org/stable/c/3876638b2c7ebb2c9d181de1191db0de8cac143a

cve.org CVE-2023-52626

nvd.nist.gov CVE-2023-52626

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-52626
© Copyright 2024 THREATINT. Made in Cyprus with +