CVE-2023-53000

Updated: 2025-11-19 04:06:15.793408

Description:

In the Linux kernel, the following vulnerability has been resolved: netlink: prevent potential spectre v1 gadgets Most netlink attributes are parsed and validated from __nla_validate_parse() or validate_nla() u16 type = nla_type(nla); if (type == 0 || type > maxtype) { /* error or continue */ } @type is then used as an array index and can be used as a Spectre v1 gadget. array_index_nospec() can be used to prevent leaking content of kernel memory to malicious users. This should take care of vast majority of netlink uses, but an audit is needed to take care of others where validation is not yet centralized in core netlink functions.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.8 HIGH Released CLSA-2025:1765463110 2025-12-11 21:14:25
CentOS 6 ELS kernel 2.6.32 7.8 HIGH Released CLSA-2026:1768669128 2026-01-28 13:07:31
CentOS 7 ELS kernel 3.10.0 7.8 HIGH Released CLSA-2025:1766617167 2026-01-12 18:11:59
CentOS 8.4 ELS kernel 4.18.0 7.8 HIGH Needs Triage 2026-01-17 01:48:13
CentOS 8.5 ELS kernel 4.18.0 7.8 HIGH Needs Triage 2026-01-17 01:48:14
Oracle Linux 6 ELS kernel 2.6.32 7.8 HIGH Released CLSA-2026:1769610819 2026-01-28 21:30:11
Oracle Linux 7 ELS kernel 3.10.0 7.8 HIGH Released CLSA-2025:1766599987 2025-12-25 14:33:34
RHEL 7 ELS kernel 3.10.0 7.8 HIGH Released CLSA-2025:1766600619 2025-12-25 14:33:14
Ubuntu 16.04 ELS linux-hwe 4.15.0 7.8 HIGH In Testing 2025-12-05 21:33:50
Ubuntu 16.04 ELS linux 4.4.0 7.8 HIGH In Testing 2025-12-05 21:29:21
Total: 11