
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, a vulnerability (CVE-2023-53372) was identified related to a potential overflow in the SCTP (Stream Control Transmission Protocol) implementation, specifically in the sctpifwdtsnskip function. The issue was discovered and disclosed in September 2025 (Ubuntu Security).
The vulnerability occurs when traversing ifwdtsn skips with sctpwalkifwdtsn, where it only checks the position against the end of the chunk. The critical issue arises when the data left for the last position is less than sizeof(struct sctpifwdtsnskip), and dereferencing it as struct sctpifwdtsnskip may cause a buffer overflow. The fix involves implementing additional checks against 'the end of the chunk - sizeof(struct sctpifwdtsnskip)' in sctpifwdtsnskip, similar to the existing sctpfwdtsn_skip implementation (Ubuntu Security).
The vulnerability affects various Linux distributions and their kernel versions, including Ubuntu 20.04 LTS, 22.04 LTS, and Red Hat Enterprise Linux systems. Multiple packages across different distributions required updates to address this security issue (Ubuntu Security).
Several fixes have been released across different distributions. Ubuntu has released patches for multiple kernel versions: linux-hwe-5.15 (5.15.0-79.86~20.04.2), linux-kvm (5.15.0-1039.44), and various other kernel packages. Red Hat has also provided updates for affected systems (Ubuntu Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."