Skip to main content

CVE-2023-52778: Vulnerability in Linux Linux

High
VulnerabilityCVE-2023-52778cvecve-2023-52778
Published: Tue May 21 2024 (05/21/2024, 15:30:58 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: mptcp: deal with large GSO size After the blamed commit below, the TCP sockets (and the MPTCP subflows) can build egress packets larger than 64K. That exceeds the maximum DSS data size, the length being misrepresent on the wire and the stream being corrupted, as later observed on the receiver: WARNING: CPU: 0 PID: 9696 at net/mptcp/protocol.c:705 __mptcp_move_skbs_from_subflow+0x2604/0x26e0 CPU: 0 PID: 9696 Comm: syz-executor.7 Not tainted 6.6.0-rc5-gcd8bdf563d46 #45 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014 netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. RIP: 0010:__mptcp_move_skbs_from_subflow+0x2604/0x26e0 net/mptcp/protocol.c:705 RSP: 0018:ffffc90000006e80 EFLAGS: 00010246 RAX: ffffffff83e9f674 RBX: ffff88802f45d870 RCX: ffff888102ad0000 netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. RDX: 0000000080000303 RSI: 0000000000013908 RDI: 0000000000003908 RBP: ffffc90000007110 R08: ffffffff83e9e078 R09: 1ffff1100e548c8a R10: dffffc0000000000 R11: ffffed100e548c8b R12: 0000000000013908 R13: dffffc0000000000 R14: 0000000000003908 R15: 000000000031cf29 FS: 00007f239c47e700(0000) GS:ffff88811b200000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f239c45cd78 CR3: 000000006a66c006 CR4: 0000000000770ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 PKRU: 55555554 Call Trace: <IRQ> mptcp_data_ready+0x263/0xac0 net/mptcp/protocol.c:819 subflow_data_ready+0x268/0x6d0 net/mptcp/subflow.c:1409 tcp_data_queue+0x21a1/0x7a60 net/ipv4/tcp_input.c:5151 tcp_rcv_established+0x950/0x1d90 net/ipv4/tcp_input.c:6098 tcp_v6_do_rcv+0x554/0x12f0 net/ipv6/tcp_ipv6.c:1483 tcp_v6_rcv+0x2e26/0x3810 net/ipv6/tcp_ipv6.c:1749 ip6_protocol_deliver_rcu+0xd6b/0x1ae0 net/ipv6/ip6_input.c:438 ip6_input+0x1c5/0x470 net/ipv6/ip6_input.c:483 ipv6_rcv+0xef/0x2c0 include/linux/netfilter.h:304 __netif_receive_skb+0x1ea/0x6a0 net/core/dev.c:5532 process_backlog+0x353/0x660 net/core/dev.c:5974 __napi_poll+0xc6/0x5a0 net/core/dev.c:6536 net_rx_action+0x6a0/0xfd0 net/core/dev.c:6603 __do_softirq+0x184/0x524 kernel/softirq.c:553 do_softirq+0xdd/0x130 kernel/softirq.c:454 Address the issue explicitly bounding the maximum GSO size to what MPTCP actually allows.

AI-Powered Analysis

AILast updated: 07/01/2025, 06:56:16 UTC

Technical Analysis

CVE-2023-52778 is a vulnerability identified in the Linux kernel's Multipath TCP (MPTCP) implementation. The issue arises from improper handling of Generic Segmentation Offload (GSO) packet sizes, allowing TCP sockets and MPTCP subflows to generate egress packets larger than 64KB. This size exceeds the maximum allowed Data Sequence Signal (DSS) data size in MPTCP, causing the length to be misrepresented on the network wire and resulting in stream corruption. The vulnerability manifests as kernel warnings and errors during packet processing, specifically within the __mptcp_move_skbs_from_subflow function. The root cause is the lack of explicit bounding of the maximum GSO size to what MPTCP supports, leading to malformed packets and potential data corruption on the receiver side. While no known exploits are currently reported in the wild, the vulnerability affects Linux kernel versions around the 6.6.0-rc5 release and potentially others that include the implicated commit. The vulnerability impacts the integrity and reliability of MPTCP connections, which are used to aggregate multiple network paths for improved throughput and redundancy. The technical details include kernel stack traces and error logs indicating the malfunction during packet reassembly and processing. The fix involves explicitly bounding the GSO size to the maximum allowed by MPTCP, preventing oversized packets from being generated and transmitted.

Potential Impact

For European organizations, the impact of CVE-2023-52778 can be significant, especially for those relying on Linux-based infrastructure that utilizes MPTCP for network resilience and performance optimization. The vulnerability can lead to data stream corruption, causing application-level disruptions, degraded network performance, and potential loss of data integrity during transmission. Critical services that depend on stable and reliable TCP connections, such as financial transaction systems, cloud services, and telecommunications infrastructure, may experience intermittent failures or degraded service quality. Additionally, corrupted streams could complicate troubleshooting and incident response efforts. Although no direct exploitation is known, the vulnerability could be leveraged in targeted attacks to disrupt communications or degrade service availability. Given the widespread use of Linux in European data centers, cloud environments, and embedded systems, the vulnerability poses a risk to operational continuity and data integrity across multiple sectors.

Mitigation Recommendations

To mitigate CVE-2023-52778, European organizations should prioritize the following actions: 1) Apply the latest Linux kernel updates and patches that explicitly address the GSO size bounding in MPTCP. Since no patch links are provided, organizations should monitor official Linux kernel repositories and distributions for relevant fixes. 2) Audit and monitor network traffic for anomalies related to MPTCP connections, such as unexpected packet sizes or stream corruption warnings in system logs. 3) Where feasible, temporarily disable MPTCP functionality on critical systems until patches are applied, especially in environments where MPTCP is not essential. 4) Implement rigorous testing of network stack updates in staging environments to ensure stability and compatibility. 5) Enhance logging and alerting around kernel network subsystem errors to detect early signs of exploitation or malfunction. 6) Collaborate with Linux distribution vendors and security communities to stay informed about emerging exploits or mitigation strategies. These steps go beyond generic advice by focusing on proactive patch management, targeted monitoring, and operational controls specific to MPTCP and Linux kernel networking.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-21T15:19:24.240Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9830c4522896dcbe7540

Added to database: 5/21/2025, 9:09:04 AM

Last enriched: 7/1/2025, 6:56:16 AM

Last updated: 8/11/2025, 11:25:38 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats