CVE-2023-53559
EUVD-2025-3231404.10.2025, 16:15
In the Linux kernel, the following vulnerability has been resolved:
ip_vti: fix potential slab-use-after-free in decode_session6
When ip_vti device is set to the qdisc of the sfb type, the cb field
of the sent skb may be modified during enqueuing. Then,
slab-use-after-free may occur when ip_vti device sends IPv6 packets.
As commit f855691975bb ("xfrm6: Fix the nexthdr offset in
_decode_session6.") showed, xfrm_decode_session was originally intended
only for the receive path. IP6CB(skb)->nhoff is not set during
transmission. Therefore, set the cb field in the skb to 0 before
sending packets.EnginsightAffected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 3.19.1 ≤ 𝑥 < 4.14.324 |
| linux | linux_kernel | 4.15 ≤ 𝑥 < 4.19.293 |
| linux | linux_kernel | 4.20 ≤ 𝑥 < 5.4.255 |
| linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.192 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.128 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 6.1.47 |
| linux | linux_kernel | 6.2 ≤ 𝑥 < 6.4.12 |
| linux | linux_kernel | 3.19 |
| linux | linux_kernel | 3.19:rc7 |
| linux | linux_kernel | 6.5:rc1 |
| linux | linux_kernel | 6.5:rc2 |
| linux | linux_kernel | 6.5:rc3 |
| linux | linux_kernel | 6.5:rc4 |
| linux | linux_kernel | 6.5:rc5 |
| linux | linux_kernel | 6.5:rc6 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration
References