CVE-2023-53782
Description
In the Linux kernel, the following vulnerability has been resolved:
dccp: Fix out of bounds access in DCCP error handler
There was a previous attempt to fix an out-of-bounds access in the DCCP error handlers, but that fix assumed that the error handlers only want to access the first 8 bytes of the DCCP header. Actually, they also look at the DCCP sequence number, which is stored beyond 8 bytes, so an explicit pskb_may_pull() is required.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Fixed an out-of-bounds access in the Linux kernel DCCP error handler by ensuring the sequence number is fully pulled before access.
Vulnerability
An out-of-bounds access was discovered in the DCCP error handler in the Linux kernel. A previous incomplete fix assumed only the first 8 bytes of the DCCP header were needed, but the error handler also accesses the DCCP sequence number, which is stored beyond 8 bytes. This missing pskb_may_pull() call can cause the handler to read beyond the allocated skb data [1][2][3][4].
Exploitation
An attacker can send a specially crafted DCCP packet that triggers the error handler with an insufficiently pulled header. No special privileges are required if the system has a DCCP socket available. This attack vector is network-based and can be delivered over a DCCP connection.
Impact
A successful out-of-bounds read can lead to information disclosure (leaking kernel memory) or a denial of service (kernel crash). The severity is moderate, as it requires specific packet crafting and may be mitigated by network filtering.
Mitigation
The fix has been backported to stable kernel branches in commits [1], [2], [3], [4]. Users should update to the latest kernel versions to close the vulnerability.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
93533e1027255177212bf6dc17a7dd70cb9544b8a938e329a6ecf09699eb1f8a7f10a1dccd8171411a661ec620c34f5fa977ad86c2a1bVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
9- git.kernel.org/stable/c/177212bf6dc1ff2d13d0409cddc5c9e81feec63dnvd
- git.kernel.org/stable/c/3533e10272555c422a7d51ebc0ce8c483429f7f2nvd
- git.kernel.org/stable/c/4b8a938e329ae4eb54b73b0c87b5170607b038a8nvd
- git.kernel.org/stable/c/6ecf09699eb1554299aa1e7fd13e9e80f656c2f9nvd
- git.kernel.org/stable/c/7a7dd70cb954d3efa706a429687ded88c02496fanvd
- git.kernel.org/stable/c/977ad86c2a1bcaf58f01ab98df5cc145083c489cnvd
- git.kernel.org/stable/c/d8171411a661253e6271fa10b65b46daf1b6471cnvd
- git.kernel.org/stable/c/ec620c34f5fa5d055f9f6136a387755db6157712nvd
- git.kernel.org/stable/c/f8a7f10a1dccf9868ff09342a73dce27501b86dfnvd
News mentions
0No linked articles in our index yet.