CVE-2023-53080

Source
https://cve.org/CVERecord?id=CVE-2023-53080
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53080.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-53080
Downstream
Related
Published
2025-05-02T15:55:29.825Z
Modified
2026-04-02T09:43:38.275583Z
Summary
xsk: Add missing overflow check in xdp_umem_reg
Details

In the Linux kernel, the following vulnerability has been resolved:

xsk: Add missing overflow check in xdpumemreg

The number of chunks can overflow u32. Make sure to return -EINVAL on overflow. Also remove a redundant u32 cast assigning umem->npgs.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53080.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
bbff2f321a864ee07c9d3d1245af498023146951
Fixed
580634b03a55f04a3c1968bcbd97736c079c6601
Fixed
3cfc3564411acf96bf2fb791f706a1aa4f872c1d
Fixed
a069909acc4435eeb41d05ccc03baa447cc01b7e
Fixed
bb2e3bfb2a79db0c2057c6f701b782954394c67f
Fixed
c7df4813b149362248d6ef7be41a311e27bf75fe

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53080.json"