CVE-2023-53179
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
15/09/2025
Last modified:
02/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c<br />
<br />
The missing IP_SET_HASH_WITH_NET0 macro in ip_set_hash_netportnet can<br />
lead to the use of wrong `CIDR_POS(c)` for calculating array offsets,<br />
which can lead to integer underflow. As a result, it leads to slab<br />
out-of-bound access.<br />
This patch adds back the IP_SET_HASH_WITH_NET0 macro to<br />
ip_set_hash_netportnet to address the issue.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.4.165 (including) | 4.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.9.141 (including) | 4.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.14.84 (including) | 4.14.326 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.19.5 (including) | 4.19.295 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20.1 (including) | 5.4.257 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.195 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.132 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.53 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.4.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.5 (including) | 6.5.3 (excluding) |
| cpe:2.3:o:linux:linux_kernel:4.20:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.20:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.20:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.20:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.20:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/050d91c03b28ca479df13dfb02bcd2c60dd6a878
- https://git.kernel.org/stable/c/109e830585e89a03d554bf8ad0e668630d0a6260
- https://git.kernel.org/stable/c/7935b636dd693dfe4483cfef4a1e91366c8103fa
- https://git.kernel.org/stable/c/7ca0706c68adadf86a36b60dca090f5e9481e808
- https://git.kernel.org/stable/c/83091f8ac03f118086596f17c9a52d31d6ca94b3
- https://git.kernel.org/stable/c/a9e6142e5f8f6ac7d1bca45c1b2b13b084ea9e14
- https://git.kernel.org/stable/c/d59b6fc405549f7caf31f6aa5da1d6bef746b166
- https://git.kernel.org/stable/c/d95c8420efe684b964e3aa28108e9a354bcd7225
- https://git.kernel.org/stable/c/e632d09dffc68b9602d6893a99bfe3001d36cefc



