CVE-2023-53752 — Linux vulnerability
7 documents6 sources
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 90.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 8
Description
In the Linux kernel, the following vulnerability has been resolved:
net: deal with integer overflows in kmalloc_reserve()
Blamed commit changed:
ptr = kmalloc(size);
if (ptr)
size = ksize(ptr);
size = kmalloc_size_roundup(size);
ptr = kmalloc(size);
This allowed various crash as reported by syzbot [1]
and Kyle Zeng.
Problem is that if @size is bigger than 0x80000001,
kmalloc_size_roundup(size) returns 2^32.
kmalloc_reserve() uses a 32bit variable (obj_size),
so 2^32 is truncated to 0.
kma…
Affected Packages4 packages
▶CVEListV5linux/linux0dbc898f5917c5a3bec6be19d9f5469cbc351a7d — 31cf7853a940181593e4472fc56f46574123f9f6+4
🔴Vulnerability Details
3GHSA▶
GHSA-5g3x-gjgm-77rp: In the Linux kernel, the following vulnerability has been resolved:
net: deal with integer overflows in kmalloc_reserve()
Blamed commit changed:
ptr↗2025-12-08
OSV▶
CVE-2023-53752: In the Linux kernel, the following vulnerability has been resolved: net: deal with integer overflows in kmalloc_reserve() Blamed commit changed: ptr =↗2025-12-08
📋Vendor Advisories
2💬Community
1Bugzilla▶
CVE-2023-53752 kernel: Linux kernel: Denial of Service via integer overflow in kmalloc_reserve()↗2025-12-08