CVE-2023-53439
BaseFortify
Publication date: 2025-09-18
Last updated on: 2025-12-12
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.19 (inc) to 6.1.30 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.3.4 (exc) |
| linux | linux_kernel | 6.4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-401 | The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's networking code, specifically related to the skb->transport_header field. The field uses a special value (0xFFFF) to indicate whether the transport header is set or not. The issue is that callers could accidentally set skb->transport_header to this special value, which should be prevented. Currently, only fuzzers can trigger this condition. The vulnerability was reported by syzbot and fixed to avoid this accidental setting.
How can this vulnerability impact me? :
If the skb->transport_header is incorrectly set to the special 0xFFFF value, it could cause unexpected behavior in the Linux kernel's networking stack. This might lead to kernel warnings or crashes, potentially affecting system stability or network functionality. However, the vulnerability is currently only triggered by fuzzers, so the practical impact is limited unless exploited in other ways.