CVE-2023-53667
BaseFortify
Publication date: 2025-10-07
Last updated on: 2026-02-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.4 |
| linux | linux_kernel | From 5.5 (inc) to 5.10.181 (inc) |
| linux | linux_kernel | 5.15.106 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's cdc_ncm network driver when it handles a parameter called dwNtbOutMaxSize that is too low but greater than zero. The driver uses this value to allocate memory for network packets. If dwNtbOutMaxSize is too small, the allocated memory may not be sufficient to hold all the necessary data, especially if the size of certain internal structures increases. This can cause the kernel's buffer bounds checking to fail, leading to a kernel panic (crash). The fix clamps dwNtbOutMaxSize to a minimum size to ensure enough memory is allocated and prevent this issue.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel panic) when handling network packets via the cdc_ncm driver. Such crashes can lead to denial of service, disrupting network connectivity and system availability. It may also affect system stability and reliability, especially on systems using this driver for USB network communication.