CVE-2023-53189

In the Linux kernel, the following vulnerability has been resolved: ipv6/addrconf: fix a potential refcount underflow for idev Now in addrconf_mod_rs_timer(), reference idev depends on whether rs_timer is not pending. Then modify rs_timer timeout. There is a time gap in [1], during which if the pending rs_timer becomes not pending. It will miss to hold idev, but the rs_timer is activated. Thus rs_timer callback function addrconf_rs_timer() will be executed and put idev later without holding idev. A refcount underflow issue for idev can be caused by this. if (!timer_pending(&idev->rs_timer)) in6_dev_hold(idev); <--------------[1] mod_timer(&idev->rs_timer, jiffies + when); To fix the issue, hold idev if mod_timer() return 0.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:*

History

02 Dec 2025, 02:55

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/06a0716949c22e2aefb648526580671197151acc - () https://git.kernel.org/stable/c/06a0716949c22e2aefb648526580671197151acc - Patch
References () https://git.kernel.org/stable/c/1f656e483eb4733d62f18dfb206a49b78f60f495 - () https://git.kernel.org/stable/c/1f656e483eb4733d62f18dfb206a49b78f60f495 - Patch
References () https://git.kernel.org/stable/c/2ad31ce40e8182860b631e37209e93e543790b7c - () https://git.kernel.org/stable/c/2ad31ce40e8182860b631e37209e93e543790b7c - Patch
References () https://git.kernel.org/stable/c/436b7cc7eae7851c184b671ed7a4a64c750b86f7 - () https://git.kernel.org/stable/c/436b7cc7eae7851c184b671ed7a4a64c750b86f7 - Patch
References () https://git.kernel.org/stable/c/82abd1c37d3bf2a2658b34772c17a25a6f9cca42 - () https://git.kernel.org/stable/c/82abd1c37d3bf2a2658b34772c17a25a6f9cca42 - Patch
References () https://git.kernel.org/stable/c/c6395e32935d35e6f935e7caf1c2dac5a95943b4 - () https://git.kernel.org/stable/c/c6395e32935d35e6f935e7caf1c2dac5a95943b4 - Patch
References () https://git.kernel.org/stable/c/c7eeba47058532f6077d6a658e38b6698f6ae71a - () https://git.kernel.org/stable/c/c7eeba47058532f6077d6a658e38b6698f6ae71a - Patch
References () https://git.kernel.org/stable/c/df62fdcd004afa72ecbed0e862ebb983acd3aa57 - () https://git.kernel.org/stable/c/df62fdcd004afa72ecbed0e862ebb983acd3aa57 - Patch
CWE CWE-191
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

Information

Published : 2025-09-15 14:15

Updated : 2025-12-02 02:55


NVD link : CVE-2023-53189

Mitre link : CVE-2023-53189

CVE.ORG link : CVE-2023-53189


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-191

Integer Underflow (Wrap or Wraparound)