CVE-2023-54094Linux vulnerability

7 documents6 sources
Severity
6.5MEDIUM
No vector
EPSS
0.0%
top 92.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: net: prevent skb corruption on frag list segmentation Ian reported several skb corruptions triggered by rx-gro-list, collecting different oops alike: [ 62.624003] BUG: kernel NULL pointer dereference, address: 00000000000000c0 [ 62.631083] #PF: supervisor read access in kernel mode [ 62.636312] #PF: error_code(0x0000) - not-present page [ 62.641541] PGD 0 P4D 0 [ 62.644174] Oops: 0000 [#1] PREEMPT SMP NOPTI [ 62.648629] CPU:

Affected Packages4 packages

Linuxlinux/linux_kernel5.6.05.10.188+3
Debianlinux/linux_kernel< 5.10.191-1+3
CVEListV5linux/linux3a1296a38d0cf62bffb9a03c585cbd5dbf15d596bc3ab5d2ab69823f5cff89cf74ef78ffa0386c9a+5
debiandebian/linux< linux 6.1.52-1 (bookworm)

🔴Vulnerability Details

3
OSV
net: prevent skb corruption on frag list segmentation2025-12-24
GHSA
GHSA-6wgm-8c2c-jvc6: In the Linux kernel, the following vulnerability has been resolved: net: prevent skb corruption on frag list segmentation Ian reported several skb c2025-12-24
OSV
CVE-2023-54094: In the Linux kernel, the following vulnerability has been resolved: net: prevent skb corruption on frag list segmentation Ian reported several skb cor2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: net: prevent skb corruption on frag list segmentation2025-12-24
Debian
CVE-2023-54094: linux - In the Linux kernel, the following vulnerability has been resolved: net: preven...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54094 Impact, Exploitability, and Mitigation Steps | Wiz