CVE-2023-54051

Source
https://cve.org/CVERecord?id=CVE-2023-54051
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54051.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-54051
Downstream
Related
Published
2025-12-24T12:23:01.043Z
Modified
2026-04-02T09:45:32.668309Z
Summary
net: do not allow gso_size to be set to GSO_BY_FRAGS
Details

In the Linux kernel, the following vulnerability has been resolved:

net: do not allow gsosize to be set to GSOBY_FRAGS

One missing check in virtionethdrtoskb() allowed syzbot to crash kernels again [1]

Do not allow gsosize to be set to GSOBY_FRAGS (0xffff), because this magic value is used by the kernel.

[1] general protection fault, probably for non-canonical address 0xdffffc000000000e: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000070-0x0000000000000077] CPU: 0 PID: 5039 Comm: syz-executor401 Not tainted 6.5.0-rc5-next-20230809-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 RIP: 0010:skbsegment+0x1a52/0x3ef0 net/core/skbuff.c:4500 Code: 00 00 00 e9 ab eb ff ff e8 6b 96 5d f9 48 8b 84 24 00 01 00 00 48 8d 78 70 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e ea 21 00 00 48 8b 84 24 00 01 RSP: 0018:ffffc90003d3f1c8 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 000000000001fffe RCX: 0000000000000000 RDX: 000000000000000e RSI: ffffffff882a3115 RDI: 0000000000000070 RBP: ffffc90003d3f378 R08: 0000000000000005 R09: 000000000000ffff R10: 000000000000ffff R11: 5ee4a93e456187d6 R12: 000000000001ffc6 R13: dffffc0000000000 R14: 0000000000000008 R15: 000000000000ffff FS: 00005555563f2380(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020020000 CR3: 000000001626d000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> udp6ufofragment+0x9d2/0xd50 net/ipv6/udpoffload.c:109 ipv6gsosegment+0x5c4/0x17b0 net/ipv6/ip6offload.c:120 skbmacgsosegment+0x292/0x610 net/core/gso.c:53 __skbgsosegment+0x339/0x710 net/core/gso.c:124 skbgsosegment include/net/gso.h:83 [inline] validatexmitskb+0x3a5/0xf10 net/core/dev.c:3625 __devqueuexmit+0x8f0/0x3d60 net/core/dev.c:4329 devqueuexmit include/linux/netdevice.h:3082 [inline] packetxmit+0x257/0x380 net/packet/afpacket.c:276 packetsnd net/packet/afpacket.c:3087 [inline] packetsendmsg+0x24c7/0x5570 net/packet/afpacket.c:3119 socksendmsgnosec net/socket.c:727 [inline] sock_sendmsg+0xd9/0x180 net/socket.c:750 ____sys_sendmsg+0x6ac/0x940 net/socket.c:2496 ___sys_sendmsg+0x135/0x1d0 net/socket.c:2550 _syssendmsg+0x117/0x1e0 net/socket.c:2579 dosyscallx64 arch/x86/entry/common.c:50 [inline] dosyscall64+0x38/0xb0 arch/x86/entry/common.c:80 entrySYSCALL64afterhwframe+0x63/0xcd RIP: 0033:0x7ff27cdb34d9

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54051.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3953c46c3ac7eef31a9935427371c6f54a22f1ba
Fixed
a5f9e5804d239d288d983db36bbed45ed10729a0
Fixed
4c9bfadb4301daaceb6c575fa6ad3bc82c152e79
Fixed
210ff31342ade546d8d9d0ec4d3cf9cb50ae632d
Fixed
0a593e8a9d24360fbc469c5897d0791aa2f20ed3
Fixed
578371ce0d7f67ea1e65817c04478aaab0d36b68
Fixed
2e03a92b241102aaf490439aa1b00239f84f530f
Fixed
e3636862f5595b3d2f02650f7b21d39043a34f3e
Fixed
b616be6b97688f2f2bd7c4a47ab32f27f94fb2a9

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54051.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.8.0
Fixed
4.14.324
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.293
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.255
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.192
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.128
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.47
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.4.12

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54051.json"