CVE-2023-53590
BaseFortify
Publication date: 2025-10-04
Last updated on: 2026-03-21
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1 |
| linux | linux_kernel | 6.1 |
| linux | linux_kernel | From 6.2 (inc) to 6.2.5 (exc) |
| linux | linux_kernel | From 5.10.158 (inc) to 5.10.173 (exc) |
| linux | linux_kernel | From 5.15.82 (inc) to 5.15.100 (exc) |
| linux | linux_kernel | From 5.4.226 (inc) to 5.4.235 (exc) |
| linux | linux_kernel | From 6.0.12 (inc) to 6.1 (exc) |
| linux | linux_kernel | From 6.1.1 (inc) to 6.1.18 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-667 | The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's SCTP (Stream Control Transmission Protocol) implementation involves a nested loop issue caused by the lack of a reference count in sctp_stream_priorities. Without this refcount, freeing a stream's priority required traversing all streams to check if the priority was used by others, potentially causing a nested loop with very high iterations (up to 65535 * 65535). This could lead to the CPU getting stuck (soft lockup). The fix adds a reference count to avoid this nested loop and includes a check to prevent refcount overflow.
How can this vulnerability impact me? :
This vulnerability can cause the CPU to become stuck or experience a soft lockup due to the nested loop in the SCTP stream priority handling. This can lead to system instability or degraded performance, potentially affecting the availability and reliability of systems using the affected Linux kernel SCTP implementation.