-
CVE-2023-53669
- EPSS -
- Published 07.10.2025 15:21:26
- Last modified 07.10.2025 16:15:50
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: tcp: fix skb_copy_ubufs() vs BIG TCP David Ahern reported crashes in skb_copy_ubufs() caused by TCP tx zerocopy using hugepages, and skb length bigger than ~68 KB. skb_copy_ubufs() assumed it could copy all payload using up to MAX_SKB_FRAGS order-0 pages. This assumption broke when BIG TCP was able to put up to 512 KB per skb. We did not hit this bug at Google because we use CONFIG_MAX_SKB_FRAGS=45 and limit gso_max_size to 180000. A solution is to use higher order pages if needed. v2: add missing __GFP_COMP, or we leak memory.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
7fa93e39fbb0566019c388a8038a4d58552e0910
Version
7c4e983c4f3cf94fcd879730c6caa877e0768a4d
Status
affected
Version <
3c77a377877acbaf03cd7caa21d3644a5dd16301
Version
7c4e983c4f3cf94fcd879730c6caa877e0768a4d
Status
affected
Version <
9cd62f0ba465cf647c7d8c2ca7b0d99ea0c1328f
Version
7c4e983c4f3cf94fcd879730c6caa877e0768a4d
Status
affected
Version <
7e692df3933628d974acb9f5b334d2b3e885e2a6
Version
7c4e983c4f3cf94fcd879730c6caa877e0768a4d
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
5.19
Status
affected
Version <
5.19
Version
0
Status
unaffected
Version <=
6.1.*
Version
6.1.29
Status
unaffected
Version <=
6.2.*
Version
6.2.16
Status
unaffected
Version <=
6.3.*
Version
6.3.3
Status
unaffected
Version <=
*
Version
6.4
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|