CVE-2023-54155
Integer Overflow in Linux Kernel XDP Component Causing Potential Memory Corruption
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's network core, specifically in the function bpf_xdp_adjust_tail(). The issue was related to an unnecessary check on the frame size (frame_sz) of XDP (eXpress Data Path) buffers, which was originally intended to prevent frame sizes larger than PAGE_SIZE. However, after updates to the XDP buffer initialization (xdp_init_buff), this check became obsolete and was removed. The vulnerability was identified by Syzkaller as a warning triggered by an excessively large frame size (131072), which could cause issues in packet processing. The fix removes this unnecessary frame size check, allowing XDP to work correctly with larger, contiguous physical memory allocations.
How can this vulnerability impact me? :
The impact of this vulnerability is related to the handling of network packets in the Linux kernel's XDP subsystem. If the unnecessary frame size check is present, it could cause warnings or failures when processing packets with larger frame sizes, potentially leading to dropped packets or degraded network performance. Removing the check allows the kernel to handle larger contiguous memory buffers safely, improving stability and performance in network packet processing. However, no direct security impact such as privilege escalation or denial of service is explicitly stated.