CVE-2023-53354NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 95.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 17

Description

In the Linux kernel, the following vulnerability has been resolved: skbuff: skb_segment, Call zero copy functions before using skbuff frags Commit bf5c25d60861 ("skbuff: in skb_segment, call zerocopy functions once per nskb") added the call to zero copy functions in skb_segment(). The change introduced a bug in skb_segment() because skb_orphan_frags() may possibly change the number of fragments or allocate new fragments altogether leaving nrfrags and frag to point to the old values. This can c

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel4.164.19.295+6
Debianlinux/linux_kernel< 5.10.197-1+3
CVEListV5linux/linuxbf5c25d608613eaf4dcdba5a9cac5b2afe67d635fcab3f661dbfd88e27ddbbe65368f3fa2d823175+8
debiandebian/linux< linux 6.1.55-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-g3hm-fhhv-62r9: In the Linux kernel, the following vulnerability has been resolved: skbuff: skb_segment, Call zero copy functions before using skbuff frags Commit b2025-09-17
OSV
CVE-2023-53354: In the Linux kernel, the following vulnerability has been resolved: skbuff: skb_segment, Call zero copy functions before using skbuff frags Commit bf52025-09-17

📋Vendor Advisories

2
Red Hat
kernel: skbuff: skb_segment, Call zero copy functions before using skbuff frags2025-09-17
Debian
CVE-2023-53354: linux - In the Linux kernel, the following vulnerability has been resolved: skbuff: skb...2023
CVE-2023-53354 — NULL Pointer Dereference in Linux | cvebase