CVE-2023-53752
BaseFortify
Publication date: 2025-12-08
Last updated on: 2025-12-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves integer overflows in the kmalloc_reserve() function. Specifically, when the size parameter is larger than 0x80000001, the kmalloc_size_roundup(size) function returns 2^32, which is truncated to 0 due to a 32-bit variable limitation. This causes kmalloc(0) to return a ZERO_SIZE_PTR that is not properly handled by skb allocations, potentially leading to crashes when network device MTU values are set near the maximum integer limit.
How can this vulnerability impact me? :
This vulnerability can cause various crashes in the Linux kernel, particularly related to network buffer allocations. If exploited or triggered, it may lead to system instability or denial of service due to improper handling of memory allocation sizes, especially when network device MTU values are set to very large values close to the integer limit.