CVE-2023-53372

Source
https://cve.org/CVERecord?id=CVE-2023-53372
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53372.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53372
Downstream
Published
2025-09-18T13:33:19.549Z
Modified
2026-03-20T12:33:07.216857Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
sctp: fix a potential overflow in sctp_ifwdtsn_skip
Details

In the Linux kernel, the following vulnerability has been resolved:

sctp: fix a potential overflow in sctpifwdtsnskip

Currently, when traversing ifwdtsn skips with sctpwalkifwdtsn, it only checks the pos against the end of the chunk. However, the data left for the last pos may be < sizeof(struct sctpifwdtsnskip), and dereference it as struct sctpifwdtsn_skip may cause coverflow.

This patch fixes it by checking the pos against "the end of the chunk - sizeof(struct sctpifwdtsnskip)" in sctpifwdtsnskip, similar to sctpfwdtsnskip.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53372.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0fc2ea922c8ad5520c80f03facbf396c81dce802
Fixed
4fbd094d4131a10d06a45d64158567052a35b3f4
Fixed
ad831a7079c99c01e801764b53bc9997c2e9c0f7
Fixed
79b28f42214a3d0d6a8c514db3602260bd5d6cb5
Fixed
6109f5b13ce3e3e537db6f18976ec0e9118d1c6f
Fixed
5c9367ac5a22d71841bcd00130f9146c9b227d57
Fixed
ad988e9b5ff04607e624a459209e8c2d0c15fc73
Fixed
32832a2caf82663870126c5186cf8f86c8b2a649

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53372.json"