-

CVE-2023-53669

In the Linux kernel, the following vulnerability has been resolved:

tcp: fix skb_copy_ubufs() vs BIG TCP

David Ahern reported crashes in skb_copy_ubufs() caused by TCP tx zerocopy
using hugepages, and skb length bigger than ~68 KB.

skb_copy_ubufs() assumed it could copy all payload using up to
MAX_SKB_FRAGS order-0 pages.

This assumption broke when BIG TCP was able to put up to 512 KB per skb.

We did not hit this bug at Google because we use CONFIG_MAX_SKB_FRAGS=45
and limit gso_max_size to 180000.

A solution is to use higher order pages if needed.

v2: add missing __GFP_COMP, or we leak memory.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 7fa93e39fbb0566019c388a8038a4d58552e0910
Version 7c4e983c4f3cf94fcd879730c6caa877e0768a4d
Status affected
Version < 3c77a377877acbaf03cd7caa21d3644a5dd16301
Version 7c4e983c4f3cf94fcd879730c6caa877e0768a4d
Status affected
Version < 9cd62f0ba465cf647c7d8c2ca7b0d99ea0c1328f
Version 7c4e983c4f3cf94fcd879730c6caa877e0768a4d
Status affected
Version < 7e692df3933628d974acb9f5b334d2b3e885e2a6
Version 7c4e983c4f3cf94fcd879730c6caa877e0768a4d
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.19
Status affected
Version < 5.19
Version 0
Status unaffected
Version <= 6.1.*
Version 6.1.29
Status unaffected
Version <= 6.2.*
Version 6.2.16
Status unaffected
Version <= 6.3.*
Version 6.3.3
Status unaffected
Version <= *
Version 6.4
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string