CVE-2023-53053

Source
https://cve.org/CVERecord?id=CVE-2023-53053
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53053.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53053
Downstream
Published
2025-05-02T15:55:08.575Z
Modified
2026-04-11T12:46:40.484658Z
Summary
erspan: do not use skb_mac_header() in ndo_start_xmit()
Details

In the Linux kernel, the following vulnerability has been resolved:

erspan: do not use skbmacheader() in ndostartxmit()

Drivers should not assume skbmacheader(skb) == skb->data in their ndostartxmit().

Use skbnetworkoffset() and skbtransportoffset() which better describe what is needed in erspanfbxmit() and ip6erspantunnelxmit()

syzbot reported: WARNING: CPU: 0 PID: 5083 at include/linux/skbuff.h:2873 skbmacheader include/linux/skbuff.h:2873 [inline] WARNING: CPU: 0 PID: 5083 at include/linux/skbuff.h:2873 ip6erspantunnelxmit+0x1d9c/0x2d90 net/ipv6/ip6gre.c:962 Modules linked in: CPU: 0 PID: 5083 Comm: syz-executor406 Not tainted 6.3.0-rc2-syzkaller-00866-gd4671cb96fa3 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 RIP: 0010:skbmacheader include/linux/skbuff.h:2873 [inline] RIP: 0010:ip6erspantunnelxmit+0x1d9c/0x2d90 net/ipv6/ip6gre.c:962 Code: 04 02 41 01 de 84 c0 74 08 3c 03 0f 8e 1c 0a 00 00 45 89 b4 24 c8 00 00 00 c6 85 77 fe ff ff 01 e9 33 e7 ff ff e8 b4 27 a1 f8 <0f> 0b e9 b6 e7 ff ff e8 a8 27 a1 f8 49 8d bf f0 0c 00 00 48 b8 00 RSP: 0018:ffffc90003b2f830 EFLAGS: 00010293 RAX: 0000000000000000 RBX: 000000000000ffff RCX: 0000000000000000 RDX: ffff888021273a80 RSI: ffffffff88e1bd4c RDI: 0000000000000003 RBP: ffffc90003b2f9d8 R08: 0000000000000003 R09: 000000000000ffff R10: 000000000000ffff R11: 0000000000000000 R12: ffff88802b28da00 R13: 00000000000000d0 R14: ffff88807e25b6d0 R15: ffff888023408000 FS: 0000555556a61300(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055e5b11eb6e8 CR3: 0000000027c1b000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> __netdevstartxmit include/linux/netdevice.h:4900 [inline] netdevstartxmit include/linux/netdevice.h:4914 [inline] __devdirectxmit+0x504/0x730 net/core/dev.c:4300 devdirectxmit include/linux/netdevice.h:3088 [inline] packetxmit+0x20a/0x390 net/packet/afpacket.c:285 packetsnd net/packet/afpacket.c:3075 [inline] packetsendmsg+0x31a0/0x5150 net/packet/afpacket.c:3107 socksendmsgnosec net/socket.c:724 [inline] sock_sendmsg+0xde/0x190 net/socket.c:747 __sys_sendto+0x23a/0x340 net/socket.c:2142 __dosyssendto net/socket.c:2154 [inline] __sesyssendto net/socket.c:2150 [inline] _x64syssendto+0xe1/0x1b0 net/socket.c:2150 dosyscallx64 arch/x86/entry/common.c:50 [inline] dosyscall64+0x39/0xb0 arch/x86/entry/common.c:80 entrySYSCALL64afterhwframe+0x63/0xcd RIP: 0033:0x7f123aaa1039 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 b1 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffc15d12058 EFLAGS: 00000246 ORIGRAX: 000000000000002c RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f123aaa1039 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 0000000000000000 R08: 0000000020000040 R09: 0000000000000014 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f123aa648c0 R13: 431bde82d7b634db R14: 0000000000000000 R15: 0000000000000000

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53053.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1baf5ebf8954d9bff8fa4e7dd6c416a0cebdb9e2
Fixed
da149daf821a3c05cd04f7c60776c86c5ee9685c
Fixed
b72f453e886af532bde1fd049a2d2421999630d3
Fixed
f8cec30541f5c5cc218e9a32138d45d227727f2f
Fixed
b41f37dbd9cdb60000e3b0dfad6df787591c2265
Fixed
9c7d6803689c99d55bbb862260d0ba486ff23c0b
Fixed
5d4172732f0ee1639a361a6cc5c3114bbb397386
Fixed
8e50ed774554f93d55426039b27b1e38d7fa64d8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53053.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.18.0
Fixed
4.19.280
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.240
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.177
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.105
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.22
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53053.json"