CVE-2023-53781
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.3.0-rc4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free bug in the Linux kernel's tcp_write_timer_handler function related to SMC (Shared Memory Communications). When an SMC socket is created and later closed, the kernel socket associated with it might not reach the TCP_CLOSE state, meaning certain cleanup functions and timer stops are not called. As a result, TCP timers can fire after the socket has been freed, leading to use-after-free conditions where the kernel accesses memory that has already been released.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to access freed memory, potentially leading to system crashes, instability, or security issues such as privilege escalation or denial of service. Since it involves kernel TCP sockets and timers, exploitation could disrupt network communications or compromise kernel integrity.