Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2891 articles · 106450 vulns · 38/41 feeds (7d)
← Back to list
5.5
CVE-2023-52676PATCHED
linux · linux_kernel

In the Linux kernel, the following vulnerability has been resolved: bpf: Guard stack limits against 32bit overflow This patch promotes the arithmetic around checking stack bounds to be done in the 6

Description

In the Linux kernel, the following vulnerability has been resolved: bpf: Guard stack limits against 32bit overflow This patch promotes the arithmetic around checking stack bounds to be done in the 64-bit domain, instead of the current 32bit. The arithmetic implies adding together a 64-bit register with a int offset. The register was checked to be below 1<<29 when it was variable, but not when it was fixed. The offset either comes from an instruction (in which case it is 16 bit), from another register (in which case the caller checked it to be below 1<<29 [1]), or from the size of an argument to a kfunc (in which case it can be a u32 [2]). Between the register being inconsistently checked to be below 1<<29, and the offset being up to an u32, it appears that we were open to overflowing the `int`s which were currently used for arithmetic. [1] https://github.com/torvalds/linux/blob/815fb87b753055df2d9e50f6cd80eb10235fe3e9/kernel/bpf/verifier.c#L7494-L7498 [2] https://github.com/torvalds/linux/blob/815fb87b753055df2d9e50f6cd80eb10235fe3e9/kernel/bpf/verifier.c#L11904

Affected Products

VendorProductVersions
linuxlinux_kernel< 5.11, < 6.6.14, < 6.7.2

References

  • https://git.kernel.org/stable/c/1d38a9ee81570c4bd61f557832dead4d6f816760(Patch)
  • https://git.kernel.org/stable/c/ad140fc856f0b1d5e2215bcb6d0cc247a86805a2(Patch)
  • https://git.kernel.org/stable/c/e5ad9ecb84405637df82732ee02ad741a5f782a6(Patch)
  • https://git.kernel.org/stable/c/1d38a9ee81570c4bd61f557832dead4d6f816760(Patch)
  • https://git.kernel.org/stable/c/ad140fc856f0b1d5e2215bcb6d0cc247a86805a2(Patch)
  • https://git.kernel.org/stable/c/e5ad9ecb84405637df82732ee02ad741a5f782a6(Patch)

Related News (1 articles)

Tier A
Microsoft MSRC4h ago
CVE-2023-52676 bpf: Guard stack limits against 32bit overflow
→ No new info (linked only)
CVSS 3.15.5 MEDIUM
VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CISA KEV❌ No
Actively exploited❌ No
Patch available
https://git.kernel.org/stable/c/1d38a9ee81570c4bd61f557832dead4d6f816760https://git.kernel.org/stable/c/ad140fc856f0b1d5e2215bcb6d0cc247a86805a2https://git.kernel.org/stable/c/e5ad9ecb84405637df82732ee02ad741a5f782a6https://git.kernel.org/stable/c/1d38a9ee81570c4bd61f557832dead4d6f816760https://git.kernel.org/stable/c/ad140fc856f0b1d5e2215bcb6d0cc247a86805a2https://git.kernel.org/stable/c/e5ad9ecb84405637df82732ee02ad741a5f782a6
CWECWE-190
PublishedMay 17, 2024
Last enriched5d ago
Trending Score23
Source articles1
Independent1
Info Completeness8/14
Missing: epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-23406EXP
apparmor: fix side-effect bug in match_char() macro usage
Trending: 64
HIGHCVE-2026-23269EXP
In the Linux kernel, the following vulnerability has been resolved: apparmor: validate DFA start states are in bounds in unpack_pdb Start states are read from untrusted data and used as indexes into
Trending: 62
CRITICALCVE-2026-23409EXP
apparmor: fix differential encoding verification
Trending: 61
CRITICALCVE-2026-23400EXP
rust_binder: call set_notification_done() without proc lock
Trending: 46
CRITICALCVE-2026-23399EXP
nf_tables: nft_dynset: fix possible stateful expression memleak in error path
Trending: 44

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Vulnerability Timeline

CVE Published
May 17, 2024
Patch Available
Sep 25, 2025
Discovered by ZDM
Mar 26, 2026