-
CVE-2023-53338
- EPSS 0.03%
- Published 17.09.2025 14:56:32
- Last modified 18.09.2025 13:43:34
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: lwt: Fix return values of BPF xmit ops BPF encap ops can return different types of positive values, such like NET_RX_DROP, NET_XMIT_CN, NETDEV_TX_BUSY, and so on, from function skb_do_redirect and bpf_lwt_xmit_reroute. At the xmit hook, such return values would be treated implicitly as LWTUNNEL_XMIT_CONTINUE in ip(6)_finish_output2. When this happens, skbs that have been freed would continue to the neighbor subsystem, causing use-after-free bug and kernel crashes. To fix the incorrect behavior, skb_do_redirect return values can be simply discarded, the same as tc-egress behavior. On the other hand, bpf_lwt_xmit_reroute returns useful errors to local senders, e.g. PMTU information. Thus convert its return values to avoid the conflict with LWTUNNEL_XMIT_CONTINUE.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
67f8f2bae8e7ac72e09def2b667e44704c4d1ee1
Version
3a0af8fd61f90920f6fa04e4f1e9a6a73c1b4fd2
Status
affected
Version <
a97f221651fcdc891166e9bc270e3d9bfa5a0080
Version
3a0af8fd61f90920f6fa04e4f1e9a6a73c1b4fd2
Status
affected
Version <
e3f647e4b642f9f6d32795a16f92c116c138d2af
Version
3a0af8fd61f90920f6fa04e4f1e9a6a73c1b4fd2
Status
affected
Version <
065d5f17096ec9161180e2c890afdff4dc6125f2
Version
3a0af8fd61f90920f6fa04e4f1e9a6a73c1b4fd2
Status
affected
Version <
d68c17402442f5f494a2c3ebde5cb82f6aa9160a
Version
3a0af8fd61f90920f6fa04e4f1e9a6a73c1b4fd2
Status
affected
Version <
65583f9e070db7bece20710cfa2e3daeb0b831d9
Version
3a0af8fd61f90920f6fa04e4f1e9a6a73c1b4fd2
Status
affected
Version <
29b22badb7a84b783e3a4fffca16f7768fb31205
Version
3a0af8fd61f90920f6fa04e4f1e9a6a73c1b4fd2
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
4.10
Status
affected
Version <
4.10
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.257
Status
unaffected
Version <=
5.10.*
Version
5.10.195
Status
unaffected
Version <=
5.15.*
Version
5.15.132
Status
unaffected
Version <=
6.1.*
Version
6.1.53
Status
unaffected
Version <=
6.4.*
Version
6.4.16
Status
unaffected
Version <=
6.5.*
Version
6.5.3
Status
unaffected
Version <=
*
Version
6.6
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.078 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|