VYPR
Unrated severityNVD Advisory· Published Oct 22, 2025· Updated Apr 15, 2026

CVE-2023-53716

CVE-2023-53716

Description

In the Linux kernel, the following vulnerability has been resolved:

net: fix skb leak in __skb_tstamp_tx()

Commit 50749f2dd685 ("tcp/udp: Fix memleaks of sk and zerocopy skbs with TX timestamp.") added a call to skb_orphan_frags_rx() to fix leaks with zerocopy skbs. But it ended up adding a leak of its own. When skb_orphan_frags_rx() fails, the function just returns, leaking the skb it just cloned. Free it before returning.

This bug was discovered and resolved using Coverity Static Analysis Security Testing (SAST) by Synopsys, Inc.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A memory leak in the Linux kernel's __skb_tstamp_tx() function, introduced by a previous fix, can cause resource exhaustion.

Vulnerability

Analysis

A memory leak vulnerability exists in the Linux kernel's __skb_tstamp_tx() function. The issue was introduced by commit 50749f2dd685, which added a call to skb_orphan_frags_rx() to fix a separate memory leak involving zerocopy skbs and TX timestamps. However, when skb_orphan_frags_rx() fails, the function returns without freeing the skb it had just cloned, resulting in a new leak [1][2][3].

Exploitation

An attacker would need to trigger the specific code path where skb_orphan_frags_rx() fails. This could potentially be achieved by sending network packets that cause the kernel to allocate and timestamp-related skbs, leading to repeated failures. The attack does not require special privileges beyond the ability to send network traffic, but the exact prerequisites depend on the system configuration and kernel version.

Impact

Successful exploitation leads to a kernel memory leak, which can gradually exhaust system memory resources. This may cause denial of service (DoS) as the system becomes unresponsive or crashes due to memory exhaustion. The vulnerability does not directly allow code execution or privilege escalation.

Mitigation

The fix

The fix is included in Linux kernel stable updates. Patched versions are available in the kernel git repository [1][2][3]. Users should update their kernel to a version containing the commit that frees the skb before returning on error. No workaround is known.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.