CVE-2023-53645
BaseFortify
Publication date: 2025-10-07
Last updated on: 2026-02-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-416 | The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's BPF subsystem where the function bpf_refcount_acquire incorrectly assumed that it would always succeed in acquiring a reference count on a node. However, due to changes in related functions (like rbtree_add), this assumption is invalid for non-owning references. If bpf_refcount_acquire is called after a failed addition to a red-black tree, the node's reference count might have dropped to zero and the node could be freed, leading to a use-after-free condition when bpf_refcount_acquire tries to increment the reference count. The patch fixes this by making bpf_refcount_acquire fallible (able to fail) for non-owning references, preventing unsafe increments on zero refcounts.
How can this vulnerability impact me? :
This vulnerability can lead to a use-after-free condition in the Linux kernel's BPF subsystem, which may cause kernel crashes or undefined behavior. Such issues can compromise system stability and security, potentially allowing attackers to exploit the kernel for privilege escalation or denial of service.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as a kernel warning related to refcount operations, specifically messages like 'refcount_t: addition on 0; use-after-free.' Detection involves monitoring kernel logs for such warnings. You can check the kernel log using commands like 'dmesg | grep refcount' or 'journalctl -k | grep refcount' to identify if this issue occurs on your system.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by a kernel patch that changes the behavior of bpf_refcount_acquire to safely handle non-owning references. Immediate mitigation involves updating your Linux kernel to a version that includes this patch. Until then, avoid running untrusted or vulnerable BPF programs that might trigger this issue.