CVE-2023-53080
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
02/05/2025
Last modified:
12/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
xsk: Add missing overflow check in xdp_umem_reg<br />
<br />
The number of chunks can overflow u32. Make sure to return -EINVAL on<br />
overflow. Also remove a redundant u32 cast assigning umem->npgs.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.18 (including) | 5.10.177 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.105 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.22 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.2.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/3cfc3564411acf96bf2fb791f706a1aa4f872c1d
- https://git.kernel.org/stable/c/580634b03a55f04a3c1968bcbd97736c079c6601
- https://git.kernel.org/stable/c/a069909acc4435eeb41d05ccc03baa447cc01b7e
- https://git.kernel.org/stable/c/bb2e3bfb2a79db0c2057c6f701b782954394c67f
- https://git.kernel.org/stable/c/c7df4813b149362248d6ef7be41a311e27bf75fe



