CVE-2023-53445
BaseFortify
Publication date: 2025-09-18
Last updated on: 2025-12-12
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.6 (inc) to 5.10.178 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.107 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.24 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.2.11 (exc) |
| linux | linux_kernel | 6.3 |
| linux | linux_kernel | 6.3 |
| linux | linux_kernel | 6.3 |
| linux | linux_kernel | 6.3 |
| linux | linux_kernel | 6.3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-Other |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a reference count bug in the Linux kernel's qrtr_recvmsg() function. It involves a use-after-free condition caused by improper handling of reference counts in concurrent scenarios between qrtr_recvmsg() and qrtr_endpoint_unregister(). Specifically, the bug occurs when the reference count is incremented or decremented incorrectly, leading to potential access to freed memory.
How can this vulnerability impact me? :
The impact of this vulnerability could include system instability or crashes due to use-after-free errors in the kernel. This may lead to denial of service or potentially allow an attacker to execute arbitrary code or escalate privileges by exploiting the memory corruption.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by improving the protection of node references using qrtr_node_lock to protect qrtr_node_lookup() implementation. Immediate mitigation would involve updating the Linux kernel to a version that includes this fix to avoid the refcount use-after-free bug in qrtr_recvmsg().