CVE-2023-53338

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
17/09/2025
Last modified:
14/01/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> lwt: Fix return values of BPF xmit ops<br /> <br /> BPF encap ops can return different types of positive values, such like<br /> NET_RX_DROP, NET_XMIT_CN, NETDEV_TX_BUSY, and so on, from function<br /> skb_do_redirect and bpf_lwt_xmit_reroute. At the xmit hook, such return<br /> values would be treated implicitly as LWTUNNEL_XMIT_CONTINUE in<br /> ip(6)_finish_output2. When this happens, skbs that have been freed would<br /> continue to the neighbor subsystem, causing use-after-free bug and<br /> kernel crashes.<br /> <br /> To fix the incorrect behavior, skb_do_redirect return values can be<br /> simply discarded, the same as tc-egress behavior. On the other hand,<br /> bpf_lwt_xmit_reroute returns useful errors to local senders, e.g. PMTU<br /> information. Thus convert its return values to avoid the conflict with<br /> LWTUNNEL_XMIT_CONTINUE.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.10 (including) 5.4.257 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.195 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.132 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.53 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.4.16 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.5 (including) 6.5.3 (excluding)