CVE-2023-53698Improper Update of Reference Count in Linux

Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 90.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 22

Description

In the Linux kernel, the following vulnerability has been resolved: xsk: fix refcount underflow in error path Fix a refcount underflow problem reported by syzbot that can happen when a system is running out of memory. If xp_alloc_tx_descs() fails, and it can only fail due to not having enough memory, then the error path is triggered. In this error path, the refcount of the pool is decremented as it has incremented before. However, the reference to the pool in the socket was not nulled. This me

Affected Packages4 packages

Linuxlinux/linux_kernel5.16.06.1.46+2
Debianlinux/linux_kernel< 6.1.52-1+2
CVEListV5linux/linuxf7019562f142bc041f9cde63af338d1886585923789fcd94c9cac133dd4d96e193188661aca9f6c3+5
debiandebian/linux< linux 6.1.52-1 (bookworm)

🔴Vulnerability Details

3
OSV
xsk: fix refcount underflow in error path2025-10-22
OSV
CVE-2023-53698: In the Linux kernel, the following vulnerability has been resolved: xsk: fix refcount underflow in error path Fix a refcount underflow problem reporte2025-10-22
GHSA
GHSA-f7vc-g3xh-9xx2: In the Linux kernel, the following vulnerability has been resolved: xsk: fix refcount underflow in error path Fix a refcount underflow problem repor2025-10-22

📋Vendor Advisories

2
Red Hat
kernel: xsk: fix refcount underflow in error path2025-10-22
Debian
CVE-2023-53698: linux - In the Linux kernel, the following vulnerability has been resolved: xsk: fix re...2023