CVE-2023-53372
18.09.2025, 14:15
In the Linux kernel, the following vulnerability has been resolved: sctp: fix a potential overflow in sctp_ifwdtsn_skip Currently, when traversing ifwdtsn skips with _sctp_walk_ifwdtsn, it only checks the pos against the end of the chunk. However, the data left for the last pos may be < sizeof(struct sctp_ifwdtsn_skip), and dereference it as struct sctp_ifwdtsn_skip may cause coverflow. This patch fixes it by checking the pos against "the end of the chunk - sizeof(struct sctp_ifwdtsn_skip)" in sctp_ifwdtsn_skip, similar to sctp_fwdtsn_skip.Enginsight
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 4.16 ≤ 𝑥 < 4.19.281 |
| linux | linux_kernel | 4.20 ≤ 𝑥 < 5.4.241 |
| linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.178 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.108 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 6.1.25 |
| linux | linux_kernel | 6.2 ≤ 𝑥 < 6.2.12 |
| linux | linux_kernel | 6.3:rc1 |
| linux | linux_kernel | 6.3:rc2 |
| linux | linux_kernel | 6.3:rc3 |
| linux | linux_kernel | 6.3:rc4 |
| linux | linux_kernel | 6.3:rc5 |
| linux | linux_kernel | 6.3:rc6 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration
References