{"vulnerability": "CVE-2023-53141", "sightings": [{"uuid": "ab6dba8c-907b-48a7-a2b4-7fb811032097", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-53141", "type": "seen", "source": "https://t.me/cvedetector/24350", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-53141 - Intel Ila Netlink Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-53141 \nPublished : May 2, 2025, 4:15 p.m. | 1\u00a0hour, 4\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping()  \n  \nila_xlat_nl_cmd_get_mapping() generates an empty skb,  \ntriggerring a recent sanity check [1].  \n  \nInstead, return an error code, so that user space  \ncan get it.  \n  \n[1]  \nskb_assert_len  \nWARNING: CPU: 0 PID: 5923 at include/linux/skbuff.h:2527 skb_assert_len include/linux/skbuff.h:2527 [inline]  \nWARNING: CPU: 0 PID: 5923 at include/linux/skbuff.h:2527 __dev_queue_xmit+0x1bc0/0x3488 net/core/dev.c:4156  \nModules linked in:  \nCPU: 0 PID: 5923 Comm: syz-executor269 Not tainted 6.2.0-syzkaller-18300-g2ebd1fbb946d #0  \nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023  \npstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)  \npc : skb_assert_len include/linux/skbuff.h:2527 [inline]  \npc : __dev_queue_xmit+0x1bc0/0x3488 net/core/dev.c:4156  \nlr : skb_assert_len include/linux/skbuff.h:2527 [inline]  \nlr : __dev_queue_xmit+0x1bc0/0x3488 net/core/dev.c:4156  \nsp : ffff80001e0d6c40  \nx29: ffff80001e0d6e60 x28: dfff800000000000 x27: ffff0000c86328c0  \nx26: dfff800000000000 x25: ffff0000c8632990 x24: ffff0000c8632a00  \nx23: 0000000000000000 x22: 1fffe000190c6542 x21: ffff0000c8632a10  \nx20: ffff0000c8632a00 x19: ffff80001856e000 x18: ffff80001e0d5fc0  \nx17: 0000000000000000 x16: ffff80001235d16c x15: 0000000000000000  \nx14: 0000000000000000 x13: 0000000000000001 x12: 0000000000000001  \nx11: ff80800008353a30 x10: 0000000000000000 x9 : 21567eaf25bfb600  \nx8 : 21567eaf25bfb600 x7 : 0000000000000001 x6 : 0000000000000001  \nx5 : ffff80001e0d6558 x4 : ffff800015c74760 x3 : ffff800008596744  \nx2 : 0000000000000001 x1 : 0000000100000000 x0 : 000000000000000e  \nCall trace:  \nskb_assert_len include/linux/skbuff.h:2527 [inline]  \n__dev_queue_xmit+0x1bc0/0x3488 net/core/dev.c:4156  \ndev_queue_xmit include/linux/netdevice.h:3033 [inline]  \n__netlink_deliver_tap_skb net/netlink/af_netlink.c:307 [inline]  \n__netlink_deliver_tap+0x45c/0x6f8 net/netlink/af_netlink.c:325  \nnetlink_deliver_tap+0xf4/0x174 net/netlink/af_netlink.c:338  \n__netlink_sendskb net/netlink/af_netlink.c:1283 [inline]  \nnetlink_sendskb+0x6c/0x154 net/netlink/af_netlink.c:1292  \nnetlink_unicast+0x334/0x8d4 net/netlink/af_netlink.c:1380  \nnlmsg_unicast include/net/netlink.h:1099 [inline]  \ngenlmsg_unicast include/net/genetlink.h:433 [inline]  \ngenlmsg_reply include/net/genetlink.h:443 [inline]  \nila_xlat_nl_cmd_get_mapping+0x620/0x7d0 net/ipv6/ila/ila_xlat.c:493  \ngenl_family_rcv_msg_doit net/netlink/genetlink.c:968 [inline]  \ngenl_family_rcv_msg net/netlink/genetlink.c:1048 [inline]  \ngenl_rcv_msg+0x938/0xc1c net/netlink/genetlink.c:1065  \nnetlink_rcv_skb+0x214/0x3c4 net/netlink/af_netlink.c:2574  \ngenl_rcv+0x38/0x50 net/netlink/genetlink.c:1076  \nnetlink_unicast_kernel net/netlink/af_netlink.c:1339 [inline]  \nnetlink_unicast+0x660/0x8d4 net/netlink/af_netlink.c:1365  \nnetlink_sendmsg+0x800/0xae0 net/netlink/af_netlink.c:1942  \nsock_sendmsg_nosec net/socket.c:714 [inline]  \nsock_sendmsg net/socket.c:734 [inline]  \n____sys_sendmsg+0x558/0x844 net/socket.c:2479  \n___sys_sendmsg net/socket.c:2533 [inline]  \n__sys_sendmsg+0x26c/0x33c net/socket.c:2562  \n__do_sys_sendmsg net/socket.c:2571 [inline]  \n__se_sys_sendmsg net/socket.c:2569 [inline]  \n__arm64_sys_sendmsg+0x80/0x94 net/socket.c:2569  \n__invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]  \ninvoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52  \nel0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142  \ndo_el0_svc+0x64/0x198 arch/arm64/kernel/syscall.c:193  \nel0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637  \nel0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655  \nel0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:591  \nirq event stamp: 136484  \nhardirqs [...]", "creation_timestamp": "2025-05-02T20:07:33.000000Z"}, {"uuid": "9f59029f-21ca-44c8-8003-287643e5fbda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-53141", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lo7c2mv5kd32", "content": "", "creation_timestamp": "2025-05-02T17:34:19.403793Z"}, {"uuid": "06165b3f-9b9b-4981-9525-0e9218611096", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-53141", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo7mr4dh5p2t", "content": "", "creation_timestamp": "2025-05-02T20:06:06.685716Z"}]}