CVE-2023-53338Use After Free in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 95.63%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 17

Description

In the Linux kernel, the following vulnerability has been resolved: lwt: Fix return values of BPF xmit ops BPF encap ops can return different types of positive values, such like NET_RX_DROP, NET_XMIT_CN, NETDEV_TX_BUSY, and so on, from function skb_do_redirect and bpf_lwt_xmit_reroute. At the xmit hook, such return values would be treated implicitly as LWTUNNEL_XMIT_CONTINUE in ip(6)_finish_output2. When this happens, skbs that have been freed would continue to the neighbor subsystem, causing

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel4.105.4.257+5
Debianlinux/linux_kernel< 5.10.197-1+3
CVEListV5linux/linux3a0af8fd61f90920f6fa04e4f1e9a6a73c1b4fd267f8f2bae8e7ac72e09def2b667e44704c4d1ee1+7
debiandebian/linux< linux 6.1.55-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53338: In the Linux kernel, the following vulnerability has been resolved: lwt: Fix return values of BPF xmit ops BPF encap ops can return different types of2025-09-17
GHSA
GHSA-wqfp-wxf7-9vr7: In the Linux kernel, the following vulnerability has been resolved: lwt: Fix return values of BPF xmit ops BPF encap ops can return different types2025-09-17

📋Vendor Advisories

2
Red Hat
kernel: lwt: Fix return values of BPF xmit ops2025-09-17
Debian
CVE-2023-53338: linux - In the Linux kernel, the following vulnerability has been resolved: lwt: Fix re...2023
CVE-2023-53338 — Use After Free in Linux | cvebase