CVE-2023-53660
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-07

Last updated on: 2026-02-26

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: bpf, cpumap: Handle skb as well when clean up ptr_ring The following warning was reported when running xdp_redirect_cpu with both skb-mode and stress-mode enabled: ------------[ cut here ]------------ Incorrect XDP memory type (-2128176192) usage WARNING: CPU: 7 PID: 1442 at net/core/xdp.c:405 Modules linked in: CPU: 7 PID: 1442 Comm: kworker/7:0 Tainted: G 6.5.0-rc2+ #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) Workqueue: events __cpu_map_entry_free RIP: 0010:__xdp_return+0x1e4/0x4a0 ...... Call Trace: <TASK> ? show_regs+0x65/0x70 ? __warn+0xa5/0x240 ? __xdp_return+0x1e4/0x4a0 ...... xdp_return_frame+0x4d/0x150 __cpu_map_entry_free+0xf9/0x230 process_one_work+0x6b0/0xb80 worker_thread+0x96/0x720 kthread+0x1a5/0x1f0 ret_from_fork+0x3a/0x70 ret_from_fork_asm+0x1b/0x30 </TASK> The reason for the warning is twofold. One is due to the kthread cpu_map_kthread_run() is stopped prematurely. Another one is __cpu_map_ring_cleanup() doesn't handle skb mode and treats skbs in ptr_ring as XDP frames. Prematurely-stopped kthread will be fixed by the preceding patch and ptr_ring will be empty when __cpu_map_ring_cleanup() is called. But as the comments in __cpu_map_ring_cleanup() said, handling and freeing skbs in ptr_ring as well to "catch any broken behaviour gracefully".
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-07
Last Modified
2026-02-26
Generated
2026-05-07
AI Q&A
2025-10-07
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
linux linux_kernel From 6.2 (inc) to 6.4.10 (inc)
linux linux_kernel 6.5.0-rc2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the Linux kernel involves improper handling of skb (socket buffer) objects during cleanup in the bpf cpumap feature. Specifically, the __cpu_map_ring_cleanup() function does not handle skb mode correctly and mistakenly treats skbs in ptr_ring as XDP frames, which leads to warnings and potential incorrect behavior. The issue arises when a kernel thread (kthread) stops prematurely, causing ptr_ring to contain skbs that are not properly freed, resulting in a warning about incorrect XDP memory type usage.


How can this vulnerability impact me? :

This vulnerability can cause warnings and potentially unstable behavior in the Linux kernel when using the bpf cpumap feature with skb mode enabled. It may lead to improper cleanup of network buffers, which could affect system stability or performance during network packet processing, especially under stress conditions. However, no direct security impact or exploitation details are provided.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by observing the kernel warning messages related to XDP memory type usage. Specifically, look for warnings like 'Incorrect XDP memory type (-2128176192) usage' in the kernel logs. You can check for such messages using the command: dmesg | grep -i 'Incorrect XDP memory type' or dmesg | grep -i xdp. Monitoring kernel logs for warnings related to xdp_redirect_cpu and skb-mode stress conditions can help identify the issue.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the Linux kernel to a version where this vulnerability is resolved, as the issue is fixed by handling skb cleanup properly in ptr_ring and fixing prematurely stopped kthreads. Until an update is applied, avoid running xdp_redirect_cpu with both skb-mode and stress-mode enabled simultaneously to prevent triggering the warning and potential instability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart