-
CVE-2023-53296
- EPSS 0.03%
- Published 16.09.2025 08:11:28
- Last modified 16.09.2025 12:49:16
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: sctp: check send stream number after wait_for_sndbuf This patch fixes a corner case where the asoc out stream count may change after wait_for_sndbuf. When the main thread in the client starts a connection, if its out stream count is set to N while the in stream count in the server is set to N - 2, another thread in the client keeps sending the msgs with stream number N - 1, and waits for sndbuf before processing INIT_ACK. However, after processing INIT_ACK, the out stream count in the client is shrunk to N - 2, the same to the in stream count in the server. The crash occurs when the thread waiting for sndbuf is awake and sends the msg in a non-existing stream(N - 1), the call trace is as below: KASAN: null-ptr-deref in range [0x0000000000000038-0x000000000000003f] Call Trace: <TASK> sctp_cmd_send_msg net/sctp/sm_sideeffect.c:1114 [inline] sctp_cmd_interpreter net/sctp/sm_sideeffect.c:1777 [inline] sctp_side_effects net/sctp/sm_sideeffect.c:1199 [inline] sctp_do_sm+0x197d/0x5310 net/sctp/sm_sideeffect.c:1170 sctp_primitive_SEND+0x9f/0xc0 net/sctp/primitive.c:163 sctp_sendmsg_to_asoc+0x10eb/0x1a30 net/sctp/socket.c:1868 sctp_sendmsg+0x8d4/0x1d90 net/sctp/socket.c:2026 inet_sendmsg+0x9d/0xe0 net/ipv4/af_inet.c:825 sock_sendmsg_nosec net/socket.c:722 [inline] sock_sendmsg+0xde/0x190 net/socket.c:745 The fix is to add an unlikely check for the send stream number after the thread wakes up from the wait_for_sndbuf.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
9346a1a21142357972a6f466ba6275ddc54b04ac
Version
5bbbbe32a43199c2b9ea5ea66fab6241c64beb51
Status
affected
Version <
0443fff49d6352160c200064156c25898bd9f58c
Version
5bbbbe32a43199c2b9ea5ea66fab6241c64beb51
Status
affected
Version <
b4b6dfad41aaae9e36e44327b18d5cf4b20dd2ce
Version
5bbbbe32a43199c2b9ea5ea66fab6241c64beb51
Status
affected
Version <
667eb99cf7c15fe5b0ecefe75cf658e20ef20c9f
Version
5bbbbe32a43199c2b9ea5ea66fab6241c64beb51
Status
affected
Version <
d2128636b303aa9cf065055402ee6697409a8837
Version
5bbbbe32a43199c2b9ea5ea66fab6241c64beb51
Status
affected
Version <
a615e7270318fa0b98bf1ff38daf6cf52d840312
Version
5bbbbe32a43199c2b9ea5ea66fab6241c64beb51
Status
affected
Version <
2584024b23552c00d95b50255e47bd18d306d31a
Version
5bbbbe32a43199c2b9ea5ea66fab6241c64beb51
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
4.15
Status
affected
Version <
4.15
Version
0
Status
unaffected
Version <=
4.19.*
Version
4.19.281
Status
unaffected
Version <=
5.4.*
Version
5.4.241
Status
unaffected
Version <=
5.10.*
Version
5.10.178
Status
unaffected
Version <=
5.15.*
Version
5.15.107
Status
unaffected
Version <=
6.1.*
Version
6.1.24
Status
unaffected
Version <=
6.2.*
Version
6.2.11
Status
unaffected
Version <=
*
Version
6.3
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.078 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|