CVE-2023-54112
Memory Leak in Linux Kernel kcm_sendmsg() Causes Resource Corruption
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory leak in the Linux kernel's kcm_sendmsg() function. When an error occurs during message sending, the function fails to update a pointer called 'last_skb' properly. This causes the system to reference outdated memory fragments, corrupting data structures and leading to a memory leak.
How can this vulnerability impact me? :
The memory leak can cause increased memory usage and potential system instability or crashes over time, especially under heavy network messaging loads. This can degrade system performance and reliability.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch that fixes the memory leak in the kcm_sendmsg() function of the Linux kernel. This patch properly updates the last allocated skb in 'last_skb' to prevent the memory leak. Until the patch is applied, consider monitoring for unusual memory usage or kernel logs indicating memory leaks related to kcm_sendmsg().