CVE-2023-52435Improper Restriction of Operations within the Bounds of a Memory Buffer in Linux

Severity
5.5MEDIUMNVD
OSV7.5OSV6.5
EPSS
0.0%
top 96.09%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 20
Latest updateAug 14

Description

In the Linux kernel, the following vulnerability has been resolved: net: prevent mss overflow in skb_segment() Once again syzbot is able to crash the kernel in skb_segment() [1] GSO_BY_FRAGS is a forbidden value, but unfortunately the following computation in skb_segment() can reach it quite easily : mss = mss * partial_segs; 65535 = 3 * 5 * 17 * 257, so many initial values of mss can lead to a bad final result. Make sure to limit segmentation so that the new mss value is smaller than GSO_

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages9 packages

Patches

🔴Vulnerability Details

11
OSV
linux-intel-iotg-5.15 vulnerabilities2024-06-11
OSV
linux-intel-iotg vulnerabilities2024-05-28
OSV
linux-aws, linux-aws-5.15 vulnerabilities2024-05-20
OSV
linux-hwe-5.15, linux-raspi vulnerabilities2024-05-15
OSV
linux-bluefield vulnerabilities2024-05-14

📋Vendor Advisories

13
CISA ICS
Siemens SINEC OS2025-08-14
Ubuntu
Linux kernel (Intel IoTG) vulnerabilities2024-06-11
Ubuntu
Linux kernel (Intel IoTG) vulnerabilities2024-05-28
Ubuntu
Linux kernel (AWS) vulnerabilities2024-05-20
Ubuntu
Linux kernel vulnerabilities2024-05-15

💬Community

1
Bugzilla
CVE-2023-52435 kernel: net: prevent mss overflow in skb_segment()2024-02-21