CVE-2023-53782
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an out-of-bounds access issue in the Linux kernel's DCCP (Datagram Congestion Control Protocol) error handler. The error handler was incorrectly assuming it only needed to access the first 8 bytes of the DCCP header, but it also accesses the DCCP sequence number which lies beyond those 8 bytes. This improper access could lead to reading memory outside the intended bounds, which was fixed by adding an explicit check (pskb_may_pull()) to ensure safe access.
How can this vulnerability impact me? :
The out-of-bounds access in the DCCP error handler could potentially lead to kernel memory corruption or crashes, which might be exploited to cause denial of service or possibly escalate privileges. This could impact system stability and security if an attacker crafts malicious DCCP packets to trigger the vulnerability.