In the Linux kernel, the following vulnerability has been resolved:
netfilter: ipset: Fix overflow before widen in the bitmap_ip_create() function.
When first_ip is 0, last_ip is 0xFFFFFFFF, and netmask is 31, the value of
an arithmetic expression 2 << (netmask - mask_bits - 1) is subject
to overflow due to a failure casting operands to a larger data type
before performing the arithmetic.
Note that it's harmless since the value will be checked at the next step.
Found by InfoTeCS on behalf of Linux Verification Center
(linuxtesting.org) with SVACE.
References
Configurations
Configuration 1 (hide)
|
History
31 Oct 2025, 18:49
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-190 | |
| First Time |
Linux linux Kernel
Linux |
|
| References | () https://git.kernel.org/stable/c/4e6a70fd840400e3a2e784a6673968a3eb2431c0 - Patch | |
| References | () https://git.kernel.org/stable/c/511cf17b2447fc41cfef8d71936e1fa53e395c1e - Patch | |
| References | () https://git.kernel.org/stable/c/9ea4b476cea1b7d461d16dda25ca3c7e616e2d15 - Patch | |
| References | () https://git.kernel.org/stable/c/dfd834ccc1b88bbbab81b9046a3a539dd0c2d14f - Patch | |
| References | () https://git.kernel.org/stable/c/e137d9bb26bd85ce07323a38e38ceb0b160db841 - Patch | |
| References | () https://git.kernel.org/stable/c/e88865876d47c790be0d5e23973499d75d034364 - Patch | |
| References | () https://git.kernel.org/stable/c/feefb33eefa166fc3e0fd17547b0bc0cb3baced9 - Patch | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:* |
Information
Published : 2025-03-27 17:15
Updated : 2025-10-31 18:49
NVD link : CVE-2023-53032
Mitre link : CVE-2023-53032
CVE.ORG link : CVE-2023-53032
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-190
Integer Overflow or Wraparound
