VYPR
Medium severity5.5NVD Advisory· Published Oct 1, 2025· Updated Apr 6, 2026

CVE-2023-53517

CVE-2023-53517

Description

In the Linux kernel, the following vulnerability has been resolved:

tipc: do not update mtu if msg_max is too small in mtu negotiation

When doing link mtu negotiation, a malicious peer may send Activate msg with a very small mtu, e.g. 4 in Shuang's testing, without checking for the minimum mtu, l->mtu will be set to 4 in tipc_link_proto_rcv(), then n->links[bearer_id].mtu is set to 4294967228, which is a overflow of '4 - INT_H_SIZE - EMSG_OVERHEAD' in tipc_link_mss().

With tipc_link.mtu = 4, tipc_link_xmit() kept printing the warning:

tipc: Too large msg, purging xmit list 1 5 0 40 4! tipc: Too large msg, purging xmit list 1 15 0 60 4!

And with tipc_link_entry.mtu 4294967228, a huge skb was allocated in named_distribute(), and when purging it in tipc_link_xmit(), a crash was even caused:

general protection fault, probably for non-canonical address 0x2100001011000dd: 0000 [#1] PREEMPT SMP PTI CPU: 0 PID: 0 Comm: swapper/0 Kdump: loaded Not tainted 6.3.0.neta #19 RIP: 0010:kfree_skb_list_reason+0x7e/0x1f0 Call Trace:

skb_release_data+0xf9/0x1d0 kfree_skb_reason+0x40/0x100 tipc_link_xmit+0x57a/0x740 [tipc] tipc_node_xmit+0x16c/0x5c0 [tipc] tipc_named_node_up+0x27f/0x2c0 [tipc] tipc_node_write_unlock+0x149/0x170 [tipc] tipc_rcv+0x608/0x740 [tipc] tipc_udp_recv+0xdc/0x1f0 [tipc] udp_queue_rcv_one_skb+0x33e/0x620 udp_unicast_rcv_skb.isra.72+0x75/0x90 __udp4_lib_rcv+0x56d/0xc20 ip_protocol_deliver_rcu+0x100/0x2d0

This patch fixes it by checking the new mtu against tipc_bearer_min_mtu(), and not updating mtu if it is too small.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's TIPC module, a malicious peer can set an extremely small MTU during link negotiation, causing integer overflow and system crash.

Vulnerability

Description

In the Linux kernel's TIPC (Transparent Inter-Process Communication) module, a flaw exists in the MTU negotiation of link MTU (Maximum Transmission Unit). When processing an Activate message during link setup, the function tipc_link_proto_rcv() does not validate the minimum MTU value provided by the peer. A malicious peer can send a crafted Activate message with an MTU as small as 4 bytes, bypassing any lower-bound check. This results in l->mtu being set to that tiny value. This leads to an integer overflow when computing n->links[bearer_id].mtu via the expression 4 - INT_H_SIZE - EMSG_OVERHEAD, producing an extremely large value (e.g., 4294967228).

Exploitation

An attacker with network access to a TIPC link can send a specially crafted Activate message with a very small MTU (e.g., 4). No authentication is required beyond the ability to initiate a TIPC link negotiation. The overflowed MTU value causes the kernel to allocate a huge socket buffer (skb) in named_distribute(), and when that buffer is later freed in tipc_link_xmit(), a general protection fault (GPF) occurs, leading to a system crash. The kernel log shows repeated warnings like "Too large msg, purging xmit list" before the crash [1][2].

Impact

Successful exploitation results in a denial of service (DoS) via kernel crash. The CVSS v3 score of 5.5 (Medium) reflects the requirement for network access to trigger the vulnerability, but the impact is limited to availability. No privilege escalation or data compromise is indicated.

Mitigation

The fix, introduced in Linux kernel stable commits, adds a check in tipc_link_proto_rcv() to compare the proposed MTU against tipc_bearer_min_mtu(). If the new MTU is too small, the update is rejected, preventing the overflow and subsequent crash. Users should apply the latest kernel updates from their distribution to remediate this issue [1][2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

4
  • Linux/Kernel4 versions
    cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 3 more
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=4.1,<5.10.181
    • cpe:2.3:o:linux:linux_kernel:6.4:rc1:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:6.4:rc2:*:*:*:*:*:*
    • (no CPE)

Patches

5

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.