-

CVE-2023-53179

In the Linux kernel, the following vulnerability has been resolved:

netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c

The missing IP_SET_HASH_WITH_NET0 macro in ip_set_hash_netportnet can
lead to the use of wrong `CIDR_POS(c)` for calculating array offsets,
which can lead to integer underflow. As a result, it leads to slab
out-of-bound access.
This patch adds back the IP_SET_HASH_WITH_NET0 macro to
ip_set_hash_netportnet to address the issue.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 7935b636dd693dfe4483cfef4a1e91366c8103fa
Version 0d5d0b5c41f766355f2b42c47d13ea001f754c7d
Status affected
Version < e632d09dffc68b9602d6893a99bfe3001d36cefc
Version cb3e590df429ce151d5041884a4947099b8ad6a7
Status affected
Version < 109e830585e89a03d554bf8ad0e668630d0a6260
Version 886503f34d63e681662057448819edb5b1057a97
Status affected
Version < 83091f8ac03f118086596f17c9a52d31d6ca94b3
Version 886503f34d63e681662057448819edb5b1057a97
Status affected
Version < a9e6142e5f8f6ac7d1bca45c1b2b13b084ea9e14
Version 886503f34d63e681662057448819edb5b1057a97
Status affected
Version < 7ca0706c68adadf86a36b60dca090f5e9481e808
Version 886503f34d63e681662057448819edb5b1057a97
Status affected
Version < d59b6fc405549f7caf31f6aa5da1d6bef746b166
Version 886503f34d63e681662057448819edb5b1057a97
Status affected
Version < d95c8420efe684b964e3aa28108e9a354bcd7225
Version 886503f34d63e681662057448819edb5b1057a97
Status affected
Version < 050d91c03b28ca479df13dfb02bcd2c60dd6a878
Version 886503f34d63e681662057448819edb5b1057a97
Status affected
Version 186642845b02e1a7944ef33c3a3ac41eba77517f
Status affected
Version 919560afc21f91ca352a20394d5249aba1799690
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.20
Status affected
Version < 4.20
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.326
Status unaffected
Version <= 4.19.*
Version 4.19.295
Status unaffected
Version <= 5.4.*
Version 5.4.257
Status unaffected
Version <= 5.10.*
Version 5.10.195
Status unaffected
Version <= 5.15.*
Version 5.15.132
Status unaffected
Version <= 6.1.*
Version 6.1.53
Status unaffected
Version <= 6.4.*
Version 6.4.16
Status unaffected
Version <= 6.5.*
Version 6.5.3
Status unaffected
Version <= *
Version 6.6
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.126
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String