CVE-2023-53469
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-10-10
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.46 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a null pointer dereference and use-after-free issue in the Linux kernel's af_unix subsystem, specifically in the unix_stream_sendpage() function. The function attempts to add data to the last socket buffer (skb) in the peer's receive queue without properly locking the queue. If the file descriptors (FDs) of the sockets are passed between peers creating a loop, and both sockets are closed without receiving the FD, the garbage collection process cleans up these sockets. During this cleanup, the skb with the FD is unlinked under a lock, but unix_stream_sendpage() may access the skb without locking, causing a race condition that leads to use-after-free and potential kernel faults. The issue is fixed by adding proper locking to the peer's receive queue in unix_stream_sendpage().
How can this vulnerability impact me? :
This vulnerability can cause kernel crashes or page faults due to use-after-free conditions in the Linux kernel. Exploiting this flaw could lead to denial of service by crashing the system or potentially allow an attacker to execute arbitrary code in kernel mode, compromising system stability and security.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by applying the patch that adds locking to the peer's receive queue in the unix_stream_sendpage() function. Immediate mitigation involves updating the Linux kernel to a version that includes this fix (6.5+ or the patched 6.1.46 kernel). Until then, avoid scenarios that create socket loops and ensure your system is running a kernel version with the patch applied.