CVE-2023-53752Linux vulnerability

7 documents6 sources
Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 90.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 8

Description

In the Linux kernel, the following vulnerability has been resolved: net: deal with integer overflows in kmalloc_reserve() Blamed commit changed: ptr = kmalloc(size); if (ptr) size = ksize(ptr); size = kmalloc_size_roundup(size); ptr = kmalloc(size); This allowed various crash as reported by syzbot [1] and Kyle Zeng. Problem is that if @size is bigger than 0x80000001, kmalloc_size_roundup(size) returns 2^32. kmalloc_reserve() uses a 32bit variable (obj_size), so 2^32 is truncated to 0. kma

Affected Packages4 packages

Linuxlinux/linux_kernel6.2.06.4.16+2
Debianlinux/linux_kernel< 6.1.55-1+2
CVEListV5linux/linux0dbc898f5917c5a3bec6be19d9f5469cbc351a7d31cf7853a940181593e4472fc56f46574123f9f6+4
debiandebian/linux< linux 6.1.55-1 (bookworm)

🔴Vulnerability Details

3
OSV
net: deal with integer overflows in kmalloc_reserve()2025-12-08
GHSA
GHSA-5g3x-gjgm-77rp: In the Linux kernel, the following vulnerability has been resolved: net: deal with integer overflows in kmalloc_reserve() Blamed commit changed: ptr2025-12-08
OSV
CVE-2023-53752: In the Linux kernel, the following vulnerability has been resolved: net: deal with integer overflows in kmalloc_reserve() Blamed commit changed: ptr =2025-12-08

📋Vendor Advisories

2
Red Hat
kernel: net: deal with integer overflows in kmalloc_reserve()2025-12-08
Debian
CVE-2023-53752: linux - In the Linux kernel, the following vulnerability has been resolved: net: deal w...2023

💬Community

1
Bugzilla
CVE-2023-53752 kernel: Linux kernel: Denial of Service via integer overflow in kmalloc_reserve()2025-12-08