CVE-2023-53821
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.4.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a slab-use-after-free issue in the Linux kernel's IPv6 virtual tunnel interface (ip6_vti) code. Specifically, when an ipv6_vti device is set to use the sfb type queuing discipline, the control block (cb) field of a sent socket buffer (skb) may be modified during packet enqueuing. This can lead to a use-after-free error when the device sends IPv6 packets, potentially causing kernel memory corruption or crashes. The root cause is that the cb field is not properly cleared before sending packets, which was fixed by setting it to zero prior to transmission.
How can this vulnerability impact me? :
This vulnerability can cause kernel memory corruption or crashes due to use-after-free errors in the IPv6 virtual tunnel interface. This may lead to system instability, denial of service, or potentially allow attackers to execute arbitrary code within the kernel context if exploited. The impact depends on whether the vulnerable code path is reachable and triggered in the affected system's configuration.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the fix for the slab-use-after-free in decode_session6, specifically where the cb field in the skb is set to 0 before sending IPv6 packets on ipv6_vti devices. Avoid using ipv6_vti devices with the sfb qdisc type until the patch is applied.