CVE-2023-53426
BaseFortify
Publication date: 2025-09-18
Last updated on: 2025-12-11
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.33 (inc) to 5.15.132 (exc) |
| linux | linux_kernel | From 5.16.19 (inc) to 5.17 (exc) |
| linux | linux_kernel | From 5.17.2 (inc) to 6.1.54 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.5.4 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-416 | The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free error in the Linux kernel's xsk_diag interface. It occurs when the interface is used after the socket has been unbound from the device, such as when the socket is closed or the device disappears. The issue arose because the xsk diagnostics code was still using an outdated method to check if a socket was unbound, leading to improper handling and potential errors during socket cleanup. The fix involves checking the socket's explicit state variable to properly detect when a socket is unbound and aborting the diagnostic operation if so.
How can this vulnerability impact me? :
This vulnerability can cause errors or crashes in the Linux kernel when the xsk_diag interface is used improperly after a socket has been unbound. Such use-after-free errors can lead to instability or unexpected behavior in systems relying on AF_XDP sockets, potentially affecting network operations or system reliability.