{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-53995","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-12-24T10:53:46.176Z","datePublished":"2025-12-24T10:55:32.713Z","dateUpdated":"2026-05-11T19:53:15.262Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:53:15.262Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ipv4: fix one memleak in __inet_del_ifa()\n\nI got the below warning when do fuzzing test:\nunregister_netdevice: waiting for bond0 to become free. Usage count = 2\n\nIt can be repoduced via:\n\nip link add bond0 type bond\nsysctl -w net.ipv4.conf.bond0.promote_secondaries=1\nip addr add 4.117.174.103/0 scope 0x40 dev bond0\nip addr add 192.168.100.111/255.255.255.254 scope 0 dev bond0\nip addr add 0.0.0.4/0 scope 0x40 secondary dev bond0\nip addr del 4.117.174.103/0 scope 0x40 dev bond0\nip link delete bond0 type bond\n\nIn this reproduction test case, an incorrect 'last_prim' is found in\n__inet_del_ifa(), as a result, the secondary address(0.0.0.4/0 scope 0x40)\nis lost. The memory of the secondary address is leaked and the reference of\nin_device and net_device is leaked.\n\nFix this problem:\nLook for 'last_prim' starting at location of the deleted IP and inserting\nthe promoted IP into the location of 'last_prim'."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/ipv4/devinet.c"],"versions":[{"version":"0ff60a45678e67b2547256a636fd00c1667ce4fa","lessThan":"5624f26a3574500ce23929cb2c9976a0dec9920a","status":"affected","versionType":"git"},{"version":"0ff60a45678e67b2547256a636fd00c1667ce4fa","lessThan":"7c8ddcdab1b900bed69cad6beef477fff116289e","status":"affected","versionType":"git"},{"version":"0ff60a45678e67b2547256a636fd00c1667ce4fa","lessThan":"2f1e86014d0cc084886c36a2d77bc620e2d42618","status":"affected","versionType":"git"},{"version":"0ff60a45678e67b2547256a636fd00c1667ce4fa","lessThan":"980f8445479814509a3cd55a8eabaae1c9030a4c","status":"affected","versionType":"git"},{"version":"0ff60a45678e67b2547256a636fd00c1667ce4fa","lessThan":"42652af5360d30b43b06057c193739e7dfb18f42","status":"affected","versionType":"git"},{"version":"0ff60a45678e67b2547256a636fd00c1667ce4fa","lessThan":"ac28b1ec6135649b5d78b028e47264cb3ebca5ea","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/ipv4/devinet.c"],"versions":[{"version":"2.6.15","status":"affected"},{"version":"0","lessThan":"2.6.15","status":"unaffected","versionType":"semver"},{"version":"5.4.257","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.195","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.132","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.54","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.5.4","lessThanOrEqual":"6.5.*","status":"unaffected","versionType":"semver"},{"version":"6.6","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.15","versionEndExcluding":"5.4.257"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.15","versionEndExcluding":"5.10.195"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.15","versionEndExcluding":"5.15.132"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.15","versionEndExcluding":"6.1.54"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.15","versionEndExcluding":"6.5.4"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.15","versionEndExcluding":"6.6"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/5624f26a3574500ce23929cb2c9976a0dec9920a"},{"url":"https://git.kernel.org/stable/c/7c8ddcdab1b900bed69cad6beef477fff116289e"},{"url":"https://git.kernel.org/stable/c/2f1e86014d0cc084886c36a2d77bc620e2d42618"},{"url":"https://git.kernel.org/stable/c/980f8445479814509a3cd55a8eabaae1c9030a4c"},{"url":"https://git.kernel.org/stable/c/42652af5360d30b43b06057c193739e7dfb18f42"},{"url":"https://git.kernel.org/stable/c/ac28b1ec6135649b5d78b028e47264cb3ebca5ea"}],"title":"net: ipv4: fix one memleak in __inet_del_ifa()","x_generator":{"engine":"bippy-1.2.0"}}}}