CVE-2023-53698
BaseFortify
Publication date: 2025-10-22
Last updated on: 2025-10-22
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a refcount underflow in the Linux kernel's xsk component. It occurs when the system runs out of memory and the function xp_alloc_tx_descs() fails. In this error path, the reference count of a memory pool is decremented twice because the reference to the pool in the socket is not cleared after the first decrement. When the socket is later closed, the teardown logic tries to decrement the reference count again, causing an underflow.
How can this vulnerability impact me? :
The vulnerability can lead to a refcount underflow, which may cause undefined behavior in the kernel such as memory corruption or system instability. This could potentially be exploited to cause a denial of service or other unexpected behavior on systems running the affected Linux kernel.