CVE-2023-53200
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-12-04
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 4.2 (inc) to 5.15.100 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.18 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.2.5 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-401 | The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
The impact of this vulnerability is a rare memory leak in the Linux kernel when creating new network namespaces. While the likelihood of this leak occurring is low, if it does happen, it could lead to unnecessary memory consumption over time, potentially affecting system stability or performance in environments that frequently create and destroy network namespaces.
Can you explain this vulnerability to me?
This vulnerability is a memory leak in the Linux kernel's netfilter subsystem related to the allocation of percpu counter blocks when creating new network namespaces (netns). Specifically, if the function xt_register_table fails during the creation of a new netns, the allocated percpu counter block is not freed, causing a leak. Although the probability of this error path occurring is low, the fix ensures proper cleanup to prevent even rare leaks.
What immediate steps should I take to mitigate this vulnerability?
Apply the Linux kernel update that includes the fix for the percpu counter block leak in netfilter's x_tables when creating new network namespaces. Since the probability of hitting the error path is low, ensuring your system is updated to the fixed kernel version is the recommended mitigation.