-

CVE-2023-53372

In the Linux kernel, the following vulnerability has been resolved:

sctp: fix a potential overflow in sctp_ifwdtsn_skip

Currently, when traversing ifwdtsn skips with _sctp_walk_ifwdtsn, it only
checks the pos against the end of the chunk. However, the data left for
the last pos may be < sizeof(struct sctp_ifwdtsn_skip), and dereference
it as struct sctp_ifwdtsn_skip may cause coverflow.

This patch fixes it by checking the pos against "the end of the chunk -
sizeof(struct sctp_ifwdtsn_skip)" in sctp_ifwdtsn_skip, similar to
sctp_fwdtsn_skip.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 4fbd094d4131a10d06a45d64158567052a35b3f4
Version 0fc2ea922c8ad5520c80f03facbf396c81dce802
Status affected
Version < ad831a7079c99c01e801764b53bc9997c2e9c0f7
Version 0fc2ea922c8ad5520c80f03facbf396c81dce802
Status affected
Version < 79b28f42214a3d0d6a8c514db3602260bd5d6cb5
Version 0fc2ea922c8ad5520c80f03facbf396c81dce802
Status affected
Version < 6109f5b13ce3e3e537db6f18976ec0e9118d1c6f
Version 0fc2ea922c8ad5520c80f03facbf396c81dce802
Status affected
Version < 5c9367ac5a22d71841bcd00130f9146c9b227d57
Version 0fc2ea922c8ad5520c80f03facbf396c81dce802
Status affected
Version < ad988e9b5ff04607e624a459209e8c2d0c15fc73
Version 0fc2ea922c8ad5520c80f03facbf396c81dce802
Status affected
Version < 32832a2caf82663870126c5186cf8f86c8b2a649
Version 0fc2ea922c8ad5520c80f03facbf396c81dce802
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 4.16
Status affected
Version < 4.16
Version 0
Status unaffected
Version <= 4.19.*
Version 4.19.281
Status unaffected
Version <= 5.4.*
Version 5.4.241
Status unaffected
Version <= 5.10.*
Version 5.10.178
Status unaffected
Version <= 5.15.*
Version 5.15.108
Status unaffected
Version <= 6.1.*
Version 6.1.25
Status unaffected
Version <= 6.2.*
Version 6.2.12
Status unaffected
Version <= *
Version 6.3
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.078
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string