CVE-2023-53660
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
07/10/2025
Last modified:
03/02/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bpf, cpumap: Handle skb as well when clean up ptr_ring<br />
<br />
The following warning was reported when running xdp_redirect_cpu with<br />
both skb-mode and stress-mode enabled:<br />
<br />
------------[ cut here ]------------<br />
Incorrect XDP memory type (-2128176192) usage<br />
WARNING: CPU: 7 PID: 1442 at net/core/xdp.c:405<br />
Modules linked in:<br />
CPU: 7 PID: 1442 Comm: kworker/7:0 Tainted: G 6.5.0-rc2+ #1<br />
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)<br />
Workqueue: events __cpu_map_entry_free<br />
RIP: 0010:__xdp_return+0x1e4/0x4a0<br />
......<br />
Call Trace:<br />
<br />
? show_regs+0x65/0x70<br />
? __warn+0xa5/0x240<br />
? __xdp_return+0x1e4/0x4a0<br />
......<br />
xdp_return_frame+0x4d/0x150<br />
__cpu_map_entry_free+0xf9/0x230<br />
process_one_work+0x6b0/0xb80<br />
worker_thread+0x96/0x720<br />
kthread+0x1a5/0x1f0<br />
ret_from_fork+0x3a/0x70<br />
ret_from_fork_asm+0x1b/0x30<br />
<br />
<br />
The reason for the warning is twofold. One is due to the kthread<br />
cpu_map_kthread_run() is stopped prematurely. Another one is<br />
__cpu_map_ring_cleanup() doesn&#39;t handle skb mode and treats skbs in<br />
ptr_ring as XDP frames.<br />
<br />
Prematurely-stopped kthread will be fixed by the preceding patch and<br />
ptr_ring will be empty when __cpu_map_ring_cleanup() is called. But<br />
as the comments in __cpu_map_ring_cleanup() said, handling and freeing<br />
skbs in ptr_ring as well to "catch any broken behaviour gracefully".
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15 (including) | 5.15.126 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.45 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.4.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.5:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



