CVE-2023-53218
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-12-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 4.11 (inc) to 6.2.16 (exc) |
| linux | linux_kernel | From 6.3 (inc) to 6.3.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's rxrpc subsystem involves the sendmsg() function, which creates an rxrpc call and waits for a connection and channel to be assigned before sending encrypted data. If sendmsg() is interrupted before the connection is assigned, subsequent sendmsg() calls fail with an EBUSY error until the connection is assigned. The fix allows the waiting process to be aborted properly without causing EBUSY errors or kernel crashes.
How can this vulnerability impact me? :
This vulnerability can cause sendmsg() calls to fail with EBUSY errors if interrupted before a connection is assigned, potentially leading to application errors or delays in communication. Additionally, if not fixed, it could cause kernel crashes (oops) due to improper handling of call timers, affecting system stability.