CVE-2023-53781Linux vulnerability

7 documents6 sources
Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 89.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 9

Description

In the Linux kernel, the following vulnerability has been resolved: smc: Fix use-after-free in tcp_write_timer_handler(). With Eric's ref tracker, syzbot finally found a repro for use-after-free in tcp_write_timer_handler() by kernel TCP sockets. [0] If SMC creates a kernel socket in __smc_create(), the kernel socket is supposed to be freed in smc_clcsock_release() by calling sock_release() when we close() the parent SMC socket. However, at the end of smc_clcsock_release(), the kernel socket

Affected Packages4 packages

Linuxlinux/linux_kernel4.11.06.2.12
Debianlinux/linux_kernel< 6.3.7-1+1
CVEListV5linux/linuxac7138746e14137a451f8539614cdd349153e0c01cc41c8acfc1ee30b4868559058db97fa44b0137+2
debiandebian/linux< linux 6.3.7-1 (forky)

🔴Vulnerability Details

3
GHSA
GHSA-3h9m-xfjq-9f2f: In the Linux kernel, the following vulnerability has been resolved: smc: Fix use-after-free in tcp_write_timer_handler()2025-12-09
OSV
CVE-2023-53781: In the Linux kernel, the following vulnerability has been resolved: smc: Fix use-after-free in tcp_write_timer_handler()2025-12-09
OSV
smc: Fix use-after-free in tcp_write_timer_handler().2025-12-09

📋Vendor Advisories

2
Red Hat
kernel: smc: Fix use-after-free in tcp_write_timer_handler()2025-12-09
Debian
CVE-2023-53781: linux - In the Linux kernel, the following vulnerability has been resolved: smc: Fix us...2023

💬Community

1
Bugzilla
CVE-2023-53781 kernel: smc: Fix use-after-free in tcp_write_timer_handler()2025-12-09