Skip to main content

CVE-2023-52628: Vulnerability in Linux Linux

High
VulnerabilityCVE-2023-52628cvecve-2023-52628
Published: Thu Mar 28 2024 (03/28/2024, 07:33:46 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: nftables: exthdr: fix 4-byte stack OOB write If priv->len is a multiple of 4, then dst[len / 4] can write past the destination array which leads to stack corruption. This construct is necessary to clean the remainder of the register in case ->len is NOT a multiple of the register size, so make it conditional just like nft_payload.c does. The bug was added in 4.1 cycle and then copied/inherited when tcp/sctp and ip option support was added. Bug reported by Zero Day Initiative project (ZDI-CAN-21950, ZDI-CAN-21951, ZDI-CAN-21961).

AI-Powered Analysis

AILast updated: 07/01/2025, 04:58:02 UTC

Technical Analysis

CVE-2023-52628 is a vulnerability identified in the Linux kernel's netfilter nftables subsystem, specifically within the exthdr (extension header) processing code. The flaw involves a 4-byte stack out-of-bounds (OOB) write that occurs when the length parameter (priv->len) is a multiple of 4. In this scenario, the code attempts to write to dst[len / 4], which exceeds the bounds of the destination array, leading to stack corruption. This vulnerability stems from a logic error in handling the remainder of the register when cleaning up data, where the code did not properly condition the write operation based on whether the length was a multiple of the register size. The bug was introduced during the Linux kernel 4.1 development cycle and propagated through subsequent additions supporting TCP, SCTP, and IP options. The vulnerability was reported by the Zero Day Initiative (ZDI) and is cataloged under multiple ZDI identifiers (ZDI-CAN-21950, ZDI-CAN-21951, ZDI-CAN-21961). Although no public exploits are currently known, the flaw could potentially be triggered by specially crafted network packets processed by nftables, which is widely used for packet filtering and firewalling in Linux environments. The absence of a CVSS score indicates that the vulnerability is newly disclosed and not yet fully assessed for severity, but the technical details suggest a risk of stack corruption that could be leveraged for denial of service or potentially privilege escalation if exploited successfully.

Potential Impact

For European organizations, the impact of CVE-2023-52628 could be significant given the widespread deployment of Linux-based systems in enterprise servers, cloud infrastructure, and network appliances. Stack corruption vulnerabilities in kernel components handling network packets can lead to system instability, crashes, or escalation of privileges if exploited by attackers. This could disrupt critical services, compromise data integrity, or allow attackers to gain unauthorized control over affected systems. Organizations relying on Linux firewalls or nftables for network security could face increased risk of targeted attacks, especially in sectors such as finance, telecommunications, government, and critical infrastructure where Linux is prevalent. The vulnerability's exploitation could also facilitate lateral movement within networks or serve as a foothold for advanced persistent threats. Although no known exploits exist yet, the potential for future weaponization necessitates proactive mitigation to protect confidentiality, integrity, and availability of systems.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions that include the patch for CVE-2023-52628 as soon as vendor updates become available. In the interim, administrators should audit their use of nftables, particularly any custom or complex rules involving extension headers, to identify potential exposure. Network segmentation and strict firewall policies can reduce the attack surface by limiting exposure to untrusted networks. Employing runtime protections such as kernel address space layout randomization (KASLR), stack canaries, and control flow integrity (CFI) can help mitigate exploitation attempts. Monitoring network traffic for anomalous or malformed packets targeting nftables may provide early detection of exploitation attempts. Additionally, organizations should review and harden their incident response plans to quickly address any suspicious activity related to this vulnerability. Collaboration with Linux distribution vendors and security communities is recommended to stay informed about patches and exploit developments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-03-06T09:52:12.091Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9830c4522896dcbe712c

Added to database: 5/21/2025, 9:09:04 AM

Last enriched: 7/1/2025, 4:58:02 AM

Last updated: 8/17/2025, 7:05:15 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats