CVE-2023-53365
BaseFortify
Publication date: 2025-09-17
Last updated on: 2025-12-12
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 2.6.26 (inc) to 4.14.322 (exc) |
| linux | linux_kernel | From 4.15 (inc) to 4.19.291 (exc) |
| linux | linux_kernel | From 4.20 (inc) to 5.4.253 (exc) |
| linux | linux_kernel | From 5.5 (inc) to 5.10.190 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.126 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.45 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.4.10 (exc) |
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | 6.5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's IPv6 multicast routing code, specifically in the ip6mr_cache_report() function. When setting up a VLAN device on the pim6reg device, a Duplicate Address Detection (DAD) Neighbor Solicitation (NS) packet may be sent via reg_vif_xmit(). During this process, skb_push() is called with a negative length, which causes the skb->data pointer to be set to an invalid memory address. This leads to a kernel panic (crash) due to an invalid memory access in skb_push(), causing a kernel BUG and system instability.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel panic) when processing certain IPv6 multicast routing packets on VLAN devices. This results in a denial of service (DoS) condition, making the affected system unstable or unavailable until it is rebooted or the issue is resolved.