{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-53372","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-09-17T14:54:09.734Z","datePublished":"2025-09-18T13:33:19.549Z","dateUpdated":"2026-05-11T19:43:40.624Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:43:40.624Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: fix a potential overflow in sctp_ifwdtsn_skip\n\nCurrently, when traversing ifwdtsn skips with _sctp_walk_ifwdtsn, it only\nchecks the pos against the end of the chunk. However, the data left for\nthe last pos may be < sizeof(struct sctp_ifwdtsn_skip), and dereference\nit as struct sctp_ifwdtsn_skip may cause coverflow.\n\nThis patch fixes it by checking the pos against \"the end of the chunk -\nsizeof(struct sctp_ifwdtsn_skip)\" in sctp_ifwdtsn_skip, similar to\nsctp_fwdtsn_skip."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/sctp/stream_interleave.c"],"versions":[{"version":"0fc2ea922c8ad5520c80f03facbf396c81dce802","lessThan":"4fbd094d4131a10d06a45d64158567052a35b3f4","status":"affected","versionType":"git"},{"version":"0fc2ea922c8ad5520c80f03facbf396c81dce802","lessThan":"ad831a7079c99c01e801764b53bc9997c2e9c0f7","status":"affected","versionType":"git"},{"version":"0fc2ea922c8ad5520c80f03facbf396c81dce802","lessThan":"79b28f42214a3d0d6a8c514db3602260bd5d6cb5","status":"affected","versionType":"git"},{"version":"0fc2ea922c8ad5520c80f03facbf396c81dce802","lessThan":"6109f5b13ce3e3e537db6f18976ec0e9118d1c6f","status":"affected","versionType":"git"},{"version":"0fc2ea922c8ad5520c80f03facbf396c81dce802","lessThan":"5c9367ac5a22d71841bcd00130f9146c9b227d57","status":"affected","versionType":"git"},{"version":"0fc2ea922c8ad5520c80f03facbf396c81dce802","lessThan":"ad988e9b5ff04607e624a459209e8c2d0c15fc73","status":"affected","versionType":"git"},{"version":"0fc2ea922c8ad5520c80f03facbf396c81dce802","lessThan":"32832a2caf82663870126c5186cf8f86c8b2a649","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/sctp/stream_interleave.c"],"versions":[{"version":"4.16","status":"affected"},{"version":"0","lessThan":"4.16","status":"unaffected","versionType":"semver"},{"version":"4.19.281","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.241","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.178","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.108","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.25","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.2.12","lessThanOrEqual":"6.2.*","status":"unaffected","versionType":"semver"},{"version":"6.3","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.16","versionEndExcluding":"4.19.281"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.16","versionEndExcluding":"5.4.241"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.16","versionEndExcluding":"5.10.178"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.16","versionEndExcluding":"5.15.108"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.16","versionEndExcluding":"6.1.25"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.16","versionEndExcluding":"6.2.12"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.16","versionEndExcluding":"6.3"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/4fbd094d4131a10d06a45d64158567052a35b3f4"},{"url":"https://git.kernel.org/stable/c/ad831a7079c99c01e801764b53bc9997c2e9c0f7"},{"url":"https://git.kernel.org/stable/c/79b28f42214a3d0d6a8c514db3602260bd5d6cb5"},{"url":"https://git.kernel.org/stable/c/6109f5b13ce3e3e537db6f18976ec0e9118d1c6f"},{"url":"https://git.kernel.org/stable/c/5c9367ac5a22d71841bcd00130f9146c9b227d57"},{"url":"https://git.kernel.org/stable/c/ad988e9b5ff04607e624a459209e8c2d0c15fc73"},{"url":"https://git.kernel.org/stable/c/32832a2caf82663870126c5186cf8f86c8b2a649"}],"title":"sctp: fix a potential overflow in sctp_ifwdtsn_skip","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.8,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2023-53372","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2026-01-14T18:53:52.812844Z"}}}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-787","description":"CWE-787 Out-of-bounds Write"}]}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-14T19:03:02.976Z"}}]}}