CVE-2023-53517Integer Overflow or Wraparound in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 1

Description

In the Linux kernel, the following vulnerability has been resolved: tipc: do not update mtu if msg_max is too small in mtu negotiation When doing link mtu negotiation, a malicious peer may send Activate msg with a very small mtu, e.g. 4 in Shuang's testing, without checking for the minimum mtu, l->mtu will be set to 4 in tipc_link_proto_rcv(), then n->links[bearer_id].mtu is set to 4294967228, which is a overflow of '4 - INT_H_SIZE - EMSG_OVERHEAD' in tipc_link_mss(). With tipc_link.mtu = 4,

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel4.15.10.181+4
Debianlinux/linux_kernel< 5.10.191-1+3
CVEListV5linux/linuxed193ece2649c194a87a9d8470195760d367c0752bd4ff4ffb92113f8acd04dbaed83269172c24b4+5
debiandebian/linux< linux 6.1.37-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53517: In the Linux kernel, the following vulnerability has been resolved: tipc: do not update mtu if msg_max is too small in mtu negotiation When doing link2025-10-01
GHSA
GHSA-hwgx-c53p-8gmw: In the Linux kernel, the following vulnerability has been resolved: tipc: do not update mtu if msg_max is too small in mtu negotiation When doing li2025-10-01

📋Vendor Advisories

2
Red Hat
kernel: Linux kernel: Denial of Service via malicious MTU negotiation in TIPC2025-10-01
Debian
CVE-2023-53517: linux - In the Linux kernel, the following vulnerability has been resolved: tipc: do no...2023