CVE-2023-53585
BaseFortify
Publication date: 2025-10-04
Last updated on: 2026-03-23
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.5 (inc) to 6.5.3 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.4.16 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.53 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.132 (exc) |
| linux | linux_kernel | From 5.7 (inc) to 5.10.195 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's bpf_sk_assign function, which improperly handles unhashed UDP sockets. The function assumes that the SOCK_RCU_FREE flag is never set between bpf_sk_assign and skb_steal_sock, but unhashed UDP sockets violate this assumption. This leads to a reference count leak because the socket's reference count is incremented but not properly decremented later, causing resource management issues. The fix was to reject unhashed sockets in bpf_sk_assign to prevent this leak.
How can this vulnerability impact me? :
The vulnerability can cause a reference count leak in the Linux kernel when handling certain UDP sockets, potentially leading to resource exhaustion or instability in the system. This could degrade system performance or cause unexpected behavior in network-related operations.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by rejecting unhashed sockets in the bpf_sk_assign helper function in the Linux kernel. To mitigate this vulnerability immediately, you should update your Linux kernel to a version that includes this fix. There are no specific configuration changes or commands provided to mitigate the issue other than applying the kernel patch or upgrade.