CVE-2023-53624

Source
https://cve.org/CVERecord?id=CVE-2023-53624
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53624.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53624
Downstream
Related
Published
2025-10-07T15:19:29.545Z
Modified
2026-03-20T12:33:15.633124Z
Summary
net/sched: sch_fq: fix integer overflow of "credit"
Details

In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_fq: fix integer overflow of "credit"

if schfq is configured with "initial quantum" having values greater than INTMAX, the first assignment of "credit" does signed integer overflow to a very negative value. In this situation, the syzkaller script provided by Cristoph triggers the CPU soft-lockup warning even with few sockets. It's not an infinite loop, but "credit" wasn't probably meant to be minus 2Gb for each new flow. Capping "initial quantum" to INT_MAX proved to fix the issue.

v2: validation of "initial quantum" is done in fqpolicy, instead of open coding in fqchange() _ suggested by Jakub Kicinski

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53624.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
afe4fd062416b158a8a8538b23adc1930a9b88dc
Fixed
4b8a05e3801661a0438fcd0cdef181030d966a5a
Fixed
d0b43125ec892aeb1b03e5df5aab595097da225a
Fixed
4fbefeab88c6e79753a25099d455d3d59d2946b4
Fixed
85f24cb2f10b2b0f2882e5786a09b4790bb3a0ad
Fixed
2322462d6f9ad4874f4e3c63df3b5cc00cb1acbd
Fixed
7041101ff6c3073fd8f2e99920f535b111c929cb

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53624.json"