CVE-2023-53500Use After Free in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 96.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 1

Description

In the Linux kernel, the following vulnerability has been resolved: xfrm: fix slab-use-after-free in decode_session6 When the xfrm device is set to the qdisc of the sfb type, the cb field of the sent skb may be modified during enqueuing. Then, slab-use-after-free may occur when the xfrm device sends IPv6 packets. The stack information is as follows: BUG: KASAN: slab-use-after-free in decode_session6+0x103f/0x1890 Read of size 1 at addr ffff8881111458ef by task swapper/3/0 CPU: 3 PID: 0 Comm:

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel3.19.14.19.293+7
Debianlinux/linux_kernel< 5.10.197-1+3
CVEListV5linux/linuxf855691975bb06373a98711e4cfe2c224244b536da4cbaa75ed088b6d70db77b9103a27e2359e243+7
debiandebian/linux< linux 6.1.52-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53500: In the Linux kernel, the following vulnerability has been resolved: xfrm: fix slab-use-after-free in decode_session6 When the xfrm device is set to th2025-10-01
GHSA
GHSA-hx6j-r6x5-73w3: In the Linux kernel, the following vulnerability has been resolved: xfrm: fix slab-use-after-free in decode_session6 When the xfrm device is set to2025-10-01

📋Vendor Advisories

2
Red Hat
kernel: xfrm: fix slab-use-after-free in decode_session62025-10-01
Debian
CVE-2023-53500: linux - In the Linux kernel, the following vulnerability has been resolved: xfrm: fix s...2023