CVE-2023-53559Use After Free in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 96.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4

Description

In the Linux kernel, the following vulnerability has been resolved: ip_vti: fix potential slab-use-after-free in decode_session6 When ip_vti device is set to the qdisc of the sfb type, the cb field of the sent skb may be modified during enqueuing. Then, slab-use-after-free may occur when ip_vti device sends IPv6 packets. As commit f855691975bb ("xfrm6: Fix the nexthdr offset in _decode_session6.") showed, xfrm_decode_session was originally intended only for the receive path. IP6CB(skb)->nhoff

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel3.19.14.14.324+8
Debianlinux/linux_kernel< 5.10.197-1+3
CVEListV5linux/linuxf855691975bb06373a98711e4cfe2c224244b53682fb41c5de243e7dfa90f32ca58e35adaff56c1d+8
debiandebian/linux< linux 6.1.52-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53559: In the Linux kernel, the following vulnerability has been resolved: ip_vti: fix potential slab-use-after-free in decode_session6 When ip_vti device is2025-10-04
GHSA
GHSA-6v4x-gf5x-r6w5: In the Linux kernel, the following vulnerability has been resolved: ip_vti: fix potential slab-use-after-free in decode_session6 When ip_vti device2025-10-04

📋Vendor Advisories

2
Red Hat
kernel: ip_vti: fix potential slab-use-after-free in decode_session62025-10-04
Debian
CVE-2023-53559: linux - In the Linux kernel, the following vulnerability has been resolved: ip_vti: fix...2023