-

CVE-2023-53624

In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_fq: fix integer overflow of "credit"

if sch_fq is configured with "initial quantum" having values greater than
INT_MAX, the first assignment of "credit" does signed integer overflow to
a very negative value.
In this situation, the syzkaller script provided by Cristoph triggers the
CPU soft-lockup warning even with few sockets. It's not an infinite loop,
but "credit" wasn't probably meant to be minus 2Gb for each new flow.
Capping "initial quantum" to INT_MAX proved to fix the issue.

v2: validation of "initial quantum" is done in fq_policy, instead of open
    coding in fq_change() _ suggested by Jakub Kicinski
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 4b8a05e3801661a0438fcd0cdef181030d966a5a
Version afe4fd062416b158a8a8538b23adc1930a9b88dc
Status affected
Version < d0b43125ec892aeb1b03e5df5aab595097da225a
Version afe4fd062416b158a8a8538b23adc1930a9b88dc
Status affected
Version < 4fbefeab88c6e79753a25099d455d3d59d2946b4
Version afe4fd062416b158a8a8538b23adc1930a9b88dc
Status affected
Version < 85f24cb2f10b2b0f2882e5786a09b4790bb3a0ad
Version afe4fd062416b158a8a8538b23adc1930a9b88dc
Status affected
Version < 2322462d6f9ad4874f4e3c63df3b5cc00cb1acbd
Version afe4fd062416b158a8a8538b23adc1930a9b88dc
Status affected
Version < 7041101ff6c3073fd8f2e99920f535b111c929cb
Version afe4fd062416b158a8a8538b23adc1930a9b88dc
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.12
Status affected
Version < 3.12
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.180
Status unaffected
Version <= 5.15.*
Version 5.15.111
Status unaffected
Version <= 6.1.*
Version 6.1.28
Status unaffected
Version <= 6.2.*
Version 6.2.15
Status unaffected
Version <= 6.3.*
Version 6.3.2
Status unaffected
Version <= *
Version 6.4
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.105
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String