CVE-2023-53698 — Improper Update of Reference Count in Linux
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 90.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 22
Description
In the Linux kernel, the following vulnerability has been resolved:
xsk: fix refcount underflow in error path
Fix a refcount underflow problem reported by syzbot that can happen
when a system is running out of memory. If xp_alloc_tx_descs() fails,
and it can only fail due to not having enough memory, then the error
path is triggered. In this error path, the refcount of the pool is
decremented as it has incremented before. However, the reference to
the pool in the socket was not nulled. This me…
Affected Packages4 packages
▶CVEListV5linux/linuxf7019562f142bc041f9cde63af338d1886585923 — 789fcd94c9cac133dd4d96e193188661aca9f6c3+5
🔴Vulnerability Details
3OSV▶
CVE-2023-53698: In the Linux kernel, the following vulnerability has been resolved: xsk: fix refcount underflow in error path Fix a refcount underflow problem reporte↗2025-10-22
GHSA▶
GHSA-f7vc-g3xh-9xx2: In the Linux kernel, the following vulnerability has been resolved:
xsk: fix refcount underflow in error path
Fix a refcount underflow problem repor↗2025-10-22