U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2023-53782 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: dccp: Fix out of bounds access in DCCP error handler There was a previous attempt to fix an out-of-bounds access in the DCCP error handlers, but that fix assumed that the error handlers only want to access the first 8 bytes of the DCCP header. Actually, they also look at the DCCP sequence number, which is stored beyond 8 bytes, so an explicit pskb_may_pull() is required.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/177212bf6dc1ff2d13d0409cddc5c9e81feec63d kernel.org
https://git.kernel.org/stable/c/3533e10272555c422a7d51ebc0ce8c483429f7f2 kernel.org
https://git.kernel.org/stable/c/4b8a938e329ae4eb54b73b0c87b5170607b038a8 kernel.org
https://git.kernel.org/stable/c/6ecf09699eb1554299aa1e7fd13e9e80f656c2f9 kernel.org
https://git.kernel.org/stable/c/7a7dd70cb954d3efa706a429687ded88c02496fa kernel.org
https://git.kernel.org/stable/c/977ad86c2a1bcaf58f01ab98df5cc145083c489c kernel.org
https://git.kernel.org/stable/c/d8171411a661253e6271fa10b65b46daf1b6471c kernel.org
https://git.kernel.org/stable/c/ec620c34f5fa5d055f9f6136a387755db6157712 kernel.org
https://git.kernel.org/stable/c/f8a7f10a1dccf9868ff09342a73dce27501b86df kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2023-53782
NVD Published Date:
12/08/2025
NVD Last Modified:
12/09/2025
Source:
kernel.org