CVE-2023-54114Incorrect Check of Function Return Value in Linux

Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: net: nsh: Use correct mac_offset to unwind gso skb in nsh_gso_segment() As the call trace shows, skb_panic was caused by wrong skb->mac_header in nsh_gso_segment(): invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 3 PID: 2737 Comm: syz Not tainted 6.3.0-next-20230505 #1 RIP: 0010:skb_panic+0xda/0xe0 call Trace: skb_push+0x91/0xa0 nsh_gso_segment+0x4f3/0x570 skb_mac_gso_segment+0x19e/0x270 __skb_gso_segment+0x1e8/0x3c0 val

Affected Packages4 packages

Linuxlinux/linux_kernel4.14.04.14.316+6
Debianlinux/linux_kernel< 5.10.191-1+3
CVEListV5linux/linuxc411ed854584a71b0e86ac3019b60e4789d880862f88c8d38ecf5ed0273f99a067246899ba499eb2+8
debiandebian/linux< linux 6.1.37-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2023-54114: In the Linux kernel, the following vulnerability has been resolved: net: nsh: Use correct mac_offset to unwind gso skb in nsh_gso_segment() As the cal2025-12-24
GHSA
GHSA-g58j-c94r-957c: In the Linux kernel, the following vulnerability has been resolved: net: nsh: Use correct mac_offset to unwind gso skb in nsh_gso_segment() As the c2025-12-24
OSV
net: nsh: Use correct mac_offset to unwind gso skb in nsh_gso_segment()2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: Linux kernel: Denial of Service due to incorrect network packet processing in NSH module2025-12-24
Debian
CVE-2023-54114: linux - In the Linux kernel, the following vulnerability has been resolved: net: nsh: U...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54114 Impact, Exploitability, and Mitigation Steps | Wiz