CVE-2023-54094

Source
https://cve.org/CVERecord?id=CVE-2023-54094
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54094.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-54094
Downstream
Related
Published
2025-12-24T13:06:22.446Z
Modified
2026-03-31T17:29:30.905752862Z
Summary
net: prevent skb corruption on frag list segmentation
Details

In the Linux kernel, the following vulnerability has been resolved:

net: prevent skb corruption on frag list segmentation

Ian reported several skb corruptions triggered by rx-gro-list, collecting different oops alike:

[ 62.624003] BUG: kernel NULL pointer dereference, address: 00000000000000c0 [ 62.631083] #PF: supervisor read access in kernel mode [ 62.636312] #PF: error_code(0x0000) - not-present page [ 62.641541] PGD 0 P4D 0 [ 62.644174] Oops: 0000 [#1] PREEMPT SMP NOPTI [ 62.648629] CPU: 1 PID: 913 Comm: napi/eno2-79 Not tainted 6.4.0 #364 [ 62.655162] Hardware name: Supermicro Super Server/A2SDi-12C-HLN4F, BIOS 1.7a 10/13/2022 [ 62.663344] RIP: 0010:__udpgsosegment (./include/linux/skbuff.h:2858 ./include/linux/udp.h:23 net/ipv4/udpoffload.c:228 net/ipv4/udpoffload.c:261 net/ipv4/udpoffload.c:277) [ 62.687193] RSP: 0018:ffffbd3a83b4f868 EFLAGS: 00010246 [ 62.692515] RAX: 00000000000000ce RBX: 0000000000000000 RCX: 0000000000000000 [ 62.699743] RDX: ffffa124def8a000 RSI: 0000000000000079 RDI: ffffa125952a14d4 [ 62.706970] RBP: ffffa124def8a000 R08: 0000000000000022 R09: 00002000001558c9 [ 62.714199] R10: 0000000000000000 R11: 00000000be554639 R12: 00000000000000e2 [ 62.721426] R13: ffffa125952a1400 R14: ffffa125952a1400 R15: 00002000001558c9 [ 62.728654] FS: 0000000000000000(0000) GS:ffffa127efa40000(0000) knlGS:0000000000000000 [ 62.736852] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 62.742702] CR2: 00000000000000c0 CR3: 00000001034b0000 CR4: 00000000003526e0 [ 62.749948] Call Trace: [ 62.752498] <TASK> [ 62.779267] inetgsosegment (net/ipv4/afinet.c:1398) [ 62.787605] skbmacgso_segment (net/core/gro.c:141) [ 62.791906] __skbgsosegment (net/core/dev.c:3403 (discriminator 2)) [ 62.800492] validatexmitskb (./include/linux/netdevice.h:4862 net/core/dev.c:3659) [ 62.804695] validatexmitskblist (net/core/dev.c:3710) [ 62.809158] schdirectxmit (net/sched/schgeneric.c:330) [ 62.813198] __devqueuexmit (net/core/dev.c:3805 net/core/dev.c:4210) net/netfilter/core.c:626) [ 62.821093] br_devqueuepushxmit (net/bridge/brforward.c:55) [ 62.825652] maybedeliver (net/bridge/brforward.c:193) [ 62.829420] brflood (net/bridge/brforward.c:233) [ 62.832758] brhandleframefinish (net/bridge/brinput.c:215) [ 62.837403] brhandleframe (net/bridge/brinput.c:298 net/bridge/brinput.c:416) [ 62.851417] __netifreceiveskb_core.constprop.0 (net/core/dev.c:5387) [ 62.866114] __netifreceiveskblistcore (net/core/dev.c:5570) [ 62.871367] netifreceiveskblistinternal (net/core/dev.c:5638 net/core/dev.c:5727) [ 62.876795] napicompletedone (./include/linux/list.h:37 ./include/net/gro.h:434 ./include/net/gro.h:429 net/core/dev.c:6067) [ 62.881004] ixgbepoll (drivers/net/ethernet/intel/ixgbe/ixgbemain.c:3191) [ 62.893534] __napipoll (net/core/dev.c:6498) [ 62.897133] napithreadedpoll (./include/linux/netpoll.h:89 net/core/dev.c:6640) [ 62.905276] kthread (kernel/kthread.c:379) [ 62.913435] retfromfork (arch/x86/entry/entry64.S:314) [ 62.917119] </TASK>

In the critical scenario, rx-gro-list GRO-ed packets are fed, via a bridge, both to the local input path and to an egress device (tun).

The segmentation of such packets unsafely writes to the cloned skbs with shared heads.

This change addresses the issue by uncloning as needed the to-be-segmented skbs.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54094.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3a1296a38d0cf62bffb9a03c585cbd5dbf15d596
Fixed
bc3ab5d2ab69823f5cff89cf74ef78ffa0386c9a
Fixed
ea438eed94ac0fe69b93ac034738823c0e989a12
Fixed
1731234e8b60063eae858c77b55c7a88f5084353
Fixed
7a59f29961cf97b98b02acaadf5a0b1f8dde938c
Fixed
c329b261afe71197d9da83c1f18eb45a7e97e089

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54094.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.6.0
Fixed
5.10.188
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.121
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.40
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.4.5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54094.json"