CVE-2023-53433Out-of-bounds Read in Linux

CWE-125Out-of-bounds Read5 documents5 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 95.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 18

Description

In the Linux kernel, the following vulnerability has been resolved: net: add vlan_get_protocol_and_depth() helper Before blamed commit, pskb_may_pull() was used instead of skb_header_pointer() in __vlan_get_protocol() and friends. Few callers depended on skb->head being populated with MAC header, syzbot caught one of them (skb_mac_gso_segment()) Add vlan_get_protocol_and_depth() to make the intent clearer and use it where sensible. This is a more generic fix than commit e9d3f80935b6 ("net/a

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel4.4.2484.5+11
Debianlinux/linux_kernel< 5.10.191-1+3
CVEListV5linux/linux30d015f5ecd9ce5706ad18a4a0649f364e3e6f7b4188c5269475ac59d467b5814c5df02756f6d907+11
debiandebian/linux< linux 6.1.37-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53433: In the Linux kernel, the following vulnerability has been resolved: net: add vlan_get_protocol_and_depth() helper Before blamed commit, pskb_may_pull(2025-09-18
GHSA
GHSA-79xj-p645-3ffq: In the Linux kernel, the following vulnerability has been resolved: net: add vlan_get_protocol_and_depth() helper Before blamed commit, pskb_may_pul2025-09-18

📋Vendor Advisories

2
Red Hat
kernel: net: add vlan_get_protocol_and_depth() helper2025-09-18
Debian
CVE-2023-53433: linux - In the Linux kernel, the following vulnerability has been resolved: net: add vl...2023
CVE-2023-53433 — Out-of-bounds Read in Linux | cvebase