CVE-2023-53660
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
07/10/2025
Last modified:
08/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bpf, cpumap: Handle skb as well when clean up ptr_ring<br />
<br />
The following warning was reported when running xdp_redirect_cpu with<br />
both skb-mode and stress-mode enabled:<br />
<br />
------------[ cut here ]------------<br />
Incorrect XDP memory type (-2128176192) usage<br />
WARNING: CPU: 7 PID: 1442 at net/core/xdp.c:405<br />
Modules linked in:<br />
CPU: 7 PID: 1442 Comm: kworker/7:0 Tainted: G 6.5.0-rc2+ #1<br />
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)<br />
Workqueue: events __cpu_map_entry_free<br />
RIP: 0010:__xdp_return+0x1e4/0x4a0<br />
......<br />
Call Trace:<br />
<br />
? show_regs+0x65/0x70<br />
? __warn+0xa5/0x240<br />
? __xdp_return+0x1e4/0x4a0<br />
......<br />
xdp_return_frame+0x4d/0x150<br />
__cpu_map_entry_free+0xf9/0x230<br />
process_one_work+0x6b0/0xb80<br />
worker_thread+0x96/0x720<br />
kthread+0x1a5/0x1f0<br />
ret_from_fork+0x3a/0x70<br />
ret_from_fork_asm+0x1b/0x30<br />
<br />
<br />
The reason for the warning is twofold. One is due to the kthread<br />
cpu_map_kthread_run() is stopped prematurely. Another one is<br />
__cpu_map_ring_cleanup() doesn&#39;t handle skb mode and treats skbs in<br />
ptr_ring as XDP frames.<br />
<br />
Prematurely-stopped kthread will be fixed by the preceding patch and<br />
ptr_ring will be empty when __cpu_map_ring_cleanup() is called. But<br />
as the comments in __cpu_map_ring_cleanup() said, handling and freeing<br />
skbs in ptr_ring as well to "catch any broken behaviour gracefully".



