CVE-2023-53726 — Numeric Range Comparison Without Minimum Check in Linux
Severity
5.3MEDIUM
No vectorEPSS
0.0%
top 85.41%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 22
Description
In the Linux kernel, the following vulnerability has been resolved:
arm64: csum: Fix OoB access in IP checksum code for negative lengths
Although commit c2c24edb1d9c ("arm64: csum: Fix pathological zero-length
calls") added an early return for zero-length input, syzkaller has
popped up with an example of a _negative_ length which causes an
undefined shift and an out-of-bounds read:
| BUG: KASAN: slab-out-of-bounds in do_csum+0x44/0x254 arch/arm64/lib/csum.c:39
| Read of size 4294966928 at add…
Affected Packages4 packages
▶CVEListV5linux/linux5777eaed566a1d63e344d3dd8f2b5e33be20643e — 5a85727239a23de1cc8d93985f1056308128f3e2+6
🔴Vulnerability Details
3OSV▶
CVE-2023-53726: In the Linux kernel, the following vulnerability has been resolved: arm64: csum: Fix OoB access in IP checksum code for negative lengths Although comm↗2025-10-22
GHSA▶
GHSA-9wr9-q3c6-m872: In the Linux kernel, the following vulnerability has been resolved:
arm64: csum: Fix OoB access in IP checksum code for negative lengths
Although co↗2025-10-22