VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54114

CVE-2023-54114

Description

In the Linux kernel, the following vulnerability has been resolved:

net: nsh: Use correct mac_offset to unwind gso skb in nsh_gso_segment()

As the call trace shows, skb_panic was caused by wrong skb->mac_header in nsh_gso_segment():

invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 3 PID: 2737 Comm: syz Not tainted 6.3.0-next-20230505 #1 RIP: 0010:skb_panic+0xda/0xe0 call Trace: skb_push+0x91/0xa0 nsh_gso_segment+0x4f3/0x570 skb_mac_gso_segment+0x19e/0x270 __skb_gso_segment+0x1e8/0x3c0 validate_xmit_skb+0x452/0x890 validate_xmit_skb_list+0x99/0xd0 sch_direct_xmit+0x294/0x7c0 __dev_queue_xmit+0x16f0/0x1d70 packet_xmit+0x185/0x210 packet_snd+0xc15/0x1170 packet_sendmsg+0x7b/0xa0 sock_sendmsg+0x14f/0x160

The root cause is: nsh_gso_segment() use skb->network_header - nhoff to reset mac_header in skb_gso_error_unwind() if inner-layer protocol gso fails. However, skb->network_header may be reset by inner-layer protocol gso function e.g. mpls_gso_segment. skb->mac_header reset by the inaccurate network_header will be larger than skb headroom.

nsh_gso_segment nhoff = skb->network_header - skb->mac_header; __skb_pull(skb,nsh_len) skb_mac_gso_segment mpls_gso_segment skb_reset_network_header(skb);//skb->network_header+=nsh_len return -EINVAL; skb_gso_error_unwind skb_push(skb, nsh_len); skb->mac_header = skb->network_header - nhoff; // skb->mac_header > skb->headroom, cause skb_push panic

Use correct mac_offset to restore mac_header and get rid of nhoff.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel, nsh_gso_segment() uses an incorrect mac_offset to unwind GSO skbs, causing a kernel panic when inner-layer GSO fails.

Vulnerability

Analysis

The vulnerability resides in the Linux kernel's NSH (Network Service Header) GSO (Generic Segmentation Offload) implementation. In nsh_gso_segment(), the function calculates an offset (nhoff) as skb->network_header - skb->mac_header to later restore the MAC header if inner-layer GSO processing fails. However, when an inner protocol like MPLS calls skb_reset_network_header(), the skb->network_header is advanced, making the saved nhoff invalid. The subsequent skb_gso_error_unwind() uses this stale offset to set skb->mac_header, which can exceed the skb headroom, leading to a kernel panic via skb_push() [1].

Exploitation

An attacker can trigger this bug by sending a crafted packet that causes GSO processing to fail in the NSH layer to fail during inner protocol processing. The attack requires the ability to send packets to a vulnerable system, typically from a local or adjacent network. No authentication is needed, as the vulnerability is triggered during packet processing in the kernel's networking stack. The crash is reproducible with a syzkaller-generated packet, as shown in the kernel bug report [1].

Impact

Successful exploitation results in a kernel panic (denial of type invalid opcode), leading to a denial of service (DoS) on the affected system. The crash occurs in skb_panic() due to an invalid MAC header offset, causing the system to become unresponsive or reboot. There is no evidence of memory corruption or privilege escalation from this bug; the primary impact is system availability.

Mitigation

The fix is to use the correct mac_offset (stored before any header modifications) instead of recalculating from network_header. The patch has been applied to the Linux kernel stable branches, as referenced in commits [1], [2], and [3]. Users should update their kernel to a version containing the fix. No workaround is available; the vulnerability is resolved by applying the kernel patch.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.