In the Linux kernel, the following vulnerability has been resolved:
xsk: Add missing overflow check in xdpumemreg
The number of chunks can overflow u32. Make sure to return -EINVAL on overflow. Also remove a redundant u32 cast assigning umem->npgs.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53080.json"
}[
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2023-53080-7cc6fee1",
"target": {
"file": "net/xdp/xdp_umem.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"322217439990070810104776362600616693452",
"201545299305058526827964828184859603044",
"286420790353588887659406674868032175771",
"151565443788241660640453535391685796671",
"247165581424509930978715723028325595233",
"6371628838745822020730767058942001140",
"195751937166086455673113409866556646191",
"75941000308859494614548796593681251759",
"129588550297777761901313935005119369015",
"240100979440031953645374440840567481287",
"99078210319417798944359348717811549933",
"287725537469389111080823993833291364859",
"338061845419496282323780983914035106858",
"30060576716092874013920979853888704170",
"97988251406840758731636918632761583421",
"289184680474037790609585185640893796693"
]
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@580634b03a55f04a3c1968bcbd97736c079c6601"
},
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2023-53080-9696e60f",
"target": {
"file": "net/xdp/xdp_umem.c",
"function": "xdp_umem_reg"
},
"digest": {
"length": 1435.0,
"function_hash": "153202876760716154734188162546114227105"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@580634b03a55f04a3c1968bcbd97736c079c6601"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53080.json"