CVE-2023-53660

Source
https://cve.org/CVERecord?id=CVE-2023-53660
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53660.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53660
Downstream
Related
Published
2025-10-07T15:21:20.307Z
Modified
2026-04-11T12:46:51.850950Z
Summary
bpf, cpumap: Handle skb as well when clean up ptr_ring
Details

In the Linux kernel, the following vulnerability has been resolved:

bpf, cpumap: Handle skb as well when clean up ptr_ring

The following warning was reported when running xdpredirectcpu with both skb-mode and stress-mode enabled:

------------[ cut here ]------------ Incorrect XDP memory type (-2128176192) usage WARNING: CPU: 7 PID: 1442 at net/core/xdp.c:405 Modules linked in: CPU: 7 PID: 1442 Comm: kworker/7:0 Tainted: G 6.5.0-rc2+ #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) Workqueue: events __cpumapentry_free RIP: 0010:__xdpreturn+0x1e4/0x4a0 ...... Call Trace: <TASK> ? showregs+0x65/0x70 ? __warn+0xa5/0x240 ? __xdpreturn+0x1e4/0x4a0 ...... xdpreturn_frame+0x4d/0x150 _cpumapentryfree+0xf9/0x230 processonework+0x6b0/0xb80 workerthread+0x96/0x720 kthread+0x1a5/0x1f0 retfromfork+0x3a/0x70 retfromforkasm+0x1b/0x30 </TASK>

The reason for the warning is twofold. One is due to the kthread cpumapkthread_run() is stopped prematurely. Another one is __cpumapringcleanup() doesn't handle skb mode and treats skbs in ptrring as XDP frames.

Prematurely-stopped kthread will be fixed by the preceding patch and ptr_ring will be empty when __cpumapring_cleanup() is called. But as the comments in __cpumapringcleanup() said, handling and freeing skbs in ptrring as well to "catch any broken behaviour gracefully".

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53660.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
11941f8a85362f612df61f4aaab0e41b64d2111d
Fixed
b58d34068fd9f96bfc7d389988dfaf9a92a8fe00
Fixed
cbd000451885801e9bbfd9cf7a7946806a85cb5e
Fixed
937345720d18f1ad006ba3d5dcb3fa121037b8a2
Fixed
7c62b75cd1a792e14b037fa4f61f9b18914e7de1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53660.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.15.0
Fixed
5.15.126
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.45
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.4.10

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53660.json"