CVE-2023-53825
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been fixed in the Linux kernel by correcting error handling in kcm_sendmsg() for SOCK_DGRAM sockets. To mitigate this vulnerability, you should update your Linux kernel to a version that includes the fix (commit c821a88bd720 or later).
Can you explain this vulnerability to me?
This vulnerability is a memory leak issue in the Linux kernel's kcm_sendmsg() function when handling SOCK_DGRAM sockets. Specifically, when an error occurs during sending a message, the function does not properly purge the message queue, which can cause the queue to become corrupted or 'messed up'. The problem arises because the code cannot determine how many bytes were copied before the error, leading to incorrect handling of the message queue. This issue was found by syzkaller and fixed by ensuring the queue is purged on error, similar to how UDP handles it.
How can this vulnerability impact me? :
The impact of this vulnerability is that the message queue for SOCK_DGRAM sockets in the kernel could become corrupted after an error in sending a message. This could potentially lead to unexpected behavior in applications relying on these sockets, such as message loss or incorrect message sequencing. However, there have been no reports of this issue causing problems in the wild, and it was primarily discovered through automated testing (syzkaller).