CVE-2023-53836 — Improper Update of Reference Count in Linux
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 90.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 9
Description
In the Linux kernel, the following vulnerability has been resolved:
bpf, sockmap: Fix skb refcnt race after locking changes
There is a race where skb's from the sk_psock_backlog can be referenced
after userspace side has already skb_consumed() the sk_buff and its refcnt
dropped to zer0 causing use after free.
The flow is the following:
while ((skb = skb_peek(&psock->ingress_skb))
sk_psock_handle_Skb(psock, skb, ..., ingress)
if (!ingress) ...
sk_psock_skb_ingress
sk_psock_skb_ingress_enqueue…
Affected Packages4 packages
▶CVEListV5linux/linux799aa7f98d53e0f541fa6b4dc9aa47b4ff2178e3 — 65ad600b9bde68d2d28709943ab00b51ca8f0a1d+4
🔴Vulnerability Details
3OSV▶
CVE-2023-53836: In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Fix skb refcnt race after locking changes There is a race where skb'↗2025-12-09
GHSA▶
GHSA-hvcx-h3h8-m36g: In the Linux kernel, the following vulnerability has been resolved:
bpf, sockmap: Fix skb refcnt race after locking changes
There is a race where sk↗2025-12-09