๐Ÿ” CVE Alert

CVE-2023-53445

MEDIUM 5.5

net: qrtr: Fix a refcount bug in qrtr_recvmsg()

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: net: qrtr: Fix a refcount bug in qrtr_recvmsg() Syzbot reported a bug as following: refcount_t: addition on 0; use-after-free. ... RIP: 0010:refcount_warn_saturate+0x17c/0x1f0 lib/refcount.c:25 ... Call Trace: <TASK> __refcount_add include/linux/refcount.h:199 [inline] __refcount_inc include/linux/refcount.h:250 [inline] refcount_inc include/linux/refcount.h:267 [inline] kref_get include/linux/kref.h:45 [inline] qrtr_node_acquire net/qrtr/af_qrtr.c:202 [inline] qrtr_node_lookup net/qrtr/af_qrtr.c:398 [inline] qrtr_send_resume_tx net/qrtr/af_qrtr.c:1003 [inline] qrtr_recvmsg+0x85f/0x990 net/qrtr/af_qrtr.c:1070 sock_recvmsg_nosec net/socket.c:1017 [inline] sock_recvmsg+0xe2/0x160 net/socket.c:1038 qrtr_ns_worker+0x170/0x1700 net/qrtr/ns.c:688 process_one_work+0x991/0x15c0 kernel/workqueue.c:2390 worker_thread+0x669/0x1090 kernel/workqueue.c:2537 It occurs in the concurrent scenario of qrtr_recvmsg() and qrtr_endpoint_unregister() as following: cpu0 cpu1 qrtr_recvmsg qrtr_endpoint_unregister qrtr_send_resume_tx qrtr_node_release qrtr_node_lookup mutex_lock(&qrtr_node_lock) spin_lock_irqsave(&qrtr_nodes_lock, ) refcount_dec_and_test(&node->ref) [node->ref == 0] radix_tree_lookup [node != NULL] __qrtr_node_release qrtr_node_acquire spin_lock_irqsave(&qrtr_nodes_lock, ) kref_get(&node->ref) [WARNING] ... mutex_unlock(&qrtr_node_lock) Use qrtr_node_lock to protect qrtr_node_lookup() implementation, this is actually improving the protection of node reference.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 18, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
0a7e0d0ef05440db03c3199e84d228db943b237f < 98a9cd82c541ef6cbdb829cd6c05cbbb471e373c 0a7e0d0ef05440db03c3199e84d228db943b237f < b9ba5906c42089f8e1d0001b7b50a7940f086cbb 0a7e0d0ef05440db03c3199e84d228db943b237f < aa95efa187b4114075f312b3c4680d050b56fdec 0a7e0d0ef05440db03c3199e84d228db943b237f < 48a07f6e00d305597396da4d7494b81cec05b9d3 0a7e0d0ef05440db03c3199e84d228db943b237f < 44d807320000db0d0013372ad39b53e12d52f758
Linux / Linux
5.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/98a9cd82c541ef6cbdb829cd6c05cbbb471e373c git.kernel.org: https://git.kernel.org/stable/c/b9ba5906c42089f8e1d0001b7b50a7940f086cbb git.kernel.org: https://git.kernel.org/stable/c/aa95efa187b4114075f312b3c4680d050b56fdec git.kernel.org: https://git.kernel.org/stable/c/48a07f6e00d305597396da4d7494b81cec05b9d3 git.kernel.org: https://git.kernel.org/stable/c/44d807320000db0d0013372ad39b53e12d52f758