CVE-2023-53669Missing Release of Memory after Effective Lifetime in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 96.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 7

Description

In the Linux kernel, the following vulnerability has been resolved: tcp: fix skb_copy_ubufs() vs BIG TCP David Ahern reported crashes in skb_copy_ubufs() caused by TCP tx zerocopy using hugepages, and skb length bigger than ~68 KB. skb_copy_ubufs() assumed it could copy all payload using up to MAX_SKB_FRAGS order-0 pages. This assumption broke when BIG TCP was able to put up to 512 KB per skb. We did not hit this bug at Google because we use CONFIG_MAX_SKB_FRAGS=45 and limit gso_max_size to

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel5.196.1.29+2
Debianlinux/linux_kernel< 6.1.37-1+2
CVEListV5linux/linux7c4e983c4f3cf94fcd879730c6caa877e0768a4d7fa93e39fbb0566019c388a8038a4d58552e0910+4
debiandebian/linux< linux 6.1.37-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-3p8v-593f-mgx8: In the Linux kernel, the following vulnerability has been resolved: tcp: fix skb_copy_ubufs() vs BIG TCP David Ahern reported crashes in skb_copy_ub2025-10-07
OSV
CVE-2023-53669: In the Linux kernel, the following vulnerability has been resolved: tcp: fix skb_copy_ubufs() vs BIG TCP David Ahern reported crashes in skb_copy_ubuf2025-10-07

📋Vendor Advisories

2
Red Hat
kernel: tcp: fix skb_copy_ubufs() vs BIG TCP2025-10-07
Debian
CVE-2023-53669: linux - In the Linux kernel, the following vulnerability has been resolved: tcp: fix sk...2023