CVE-2023-53312
BaseFortify
Publication date: 2025-09-16
Last updated on: 2025-12-01
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.19 (inc) to 6.1.39 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.4.4 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-401 | The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's network subsystem, specifically related to the use of skb_transport_offset() in the net_dev_start_xmit trace event. After a certain commit, improper handling of skb_transport_offset() could lead to issues, as indicated by warnings and trace logs. The fix addresses careful usage of skb_transport_offset() to prevent potential kernel warnings or errors during network packet transmission.
How can this vulnerability impact me? :
The vulnerability could cause kernel warnings or errors related to network packet transmission, potentially affecting system stability or network functionality. It may lead to unexpected behavior in the network stack, which could impact the performance or reliability of network communications on affected Linux systems.