In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits
If the offset + length goes over the ethernet + vlan header, then the
length is adjusted to copy the bytes that are within the boundaries of
the vlan_ethhdr scratchpad area. The remaining bytes beyond ethernet +
vlan header are copied directly from the skbuff data area.
Fix incorrect arithmetic operator: subtract, not add, the size of the
vlan header in case of double-tagged packets to adjust the length
accordingly to address CVE-2023-0179.
References
Configurations
Configuration 1 (hide)
|
History
31 Oct 2025, 18:49
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Linux linux Kernel |
|
| CWE | NVD-CWE-noinfo | |
| Summary |
|
|
| References | () https://git.kernel.org/stable/c/550efeff989b041f3746118c0ddd863c39ddc1aa - Patch | |
| References | () https://git.kernel.org/stable/c/696e1a48b1a1b01edad542a1ef293665864a4dd0 - Patch | |
| References | () https://git.kernel.org/stable/c/76ef74d4a379faa451003621a84e3498044e7aa3 - Patch | |
| References | () https://git.kernel.org/stable/c/a8acfe2c6fb99f9375a9325807a179cd8c32e6e3 - Patch | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
27 Mar 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-03-27 17:15
Updated : 2025-10-31 18:49
NVD link : CVE-2023-53033
Mitre link : CVE-2023-53033
CVE.ORG link : CVE-2023-53033
JSON object : View
Products Affected
linux
- linux_kernel
CWE
