CVE-2023-53517
BaseFortify
Publication date: 2025-10-01
Last updated on: 2026-04-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's TIPC (Transparent Inter-Process Communication) protocol during link MTU (Maximum Transmission Unit) negotiation. A malicious peer can send an Activate message with an abnormally small MTU value (e.g., 4), which is not properly checked against a minimum MTU. This causes the MTU to be set incorrectly, leading to an integer overflow and resulting in an extremely large MTU value. This large MTU causes the system to allocate huge memory buffers and eventually crash with a general protection fault. The patch fixes this by validating the MTU against a minimum value before updating it.
How can this vulnerability impact me? :
This vulnerability can cause a denial of service (DoS) on affected Linux systems by crashing the kernel due to improper MTU handling in the TIPC protocol. An attacker who can send malicious Activate messages can trigger kernel crashes, potentially disrupting services and causing system instability.