In the Linux kernel, the following vulnerability has been resolved:
ip_vti: fix potential slab-use-after-free in decode_session6
When ip_vti device is set to the qdisc of the sfb type, the cb field
of the sent skb may be modified during enqueuing. Then,
slab-use-after-free may occur when ip_vti device sends IPv6 packets.
As commit f855691975bb ("xfrm6: Fix the nexthdr offset in
_decode_session6.") showed, xfrm_decode_session was originally intended
only for the receive path. IP6CB(skb)->nhoff is not set during
transmission. Therefore, set the cb field in the skb to 0 before
sending packets.
References
Configurations
Configuration 1 (hide)
|
History
12 Feb 2026, 16:05
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Linux linux Kernel |
|
| References | () https://git.kernel.org/stable/c/0b4d69539fdea138af2befe08893850c89248068 - Patch | |
| References | () https://git.kernel.org/stable/c/2b05bf5dc437f7891dd409a3eaf5058459391c7a - Patch | |
| References | () https://git.kernel.org/stable/c/6018a266279b1a75143c7c0804dd08a5fc4c3e0b - Patch | |
| References | () https://git.kernel.org/stable/c/78e397a43e1c47321a4679cc49a6c4530bf820b9 - Patch | |
| References | () https://git.kernel.org/stable/c/7dfe23659f3677c08a60a0056cda2d91a79c15ca - Patch | |
| References | () https://git.kernel.org/stable/c/82fb41c5de243e7dfa90f32ca58e35adaff56c1d - Patch | |
| References | () https://git.kernel.org/stable/c/d34c30442d5e53a33cde79ca163320dbe2432cbd - Patch | |
| References | () https://git.kernel.org/stable/c/e1e04cc2ef2c0c0866c19f5627149a76c2baae32 - Patch | |
| CWE | CWE-416 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CPE | cpe:2.3:o:linux:linux_kernel:6.5:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.5:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.5:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.19:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.19:rc7:*:*:*:*:*:* |
04 Oct 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-04 16:15
Updated : 2026-02-12 16:05
NVD link : CVE-2023-53559
Mitre link : CVE-2023-53559
CVE.ORG link : CVE-2023-53559
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
