CVE-2023-53781 — Linux vulnerability
7 documents6 sources
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 89.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 9
Description
In the Linux kernel, the following vulnerability has been resolved:
smc: Fix use-after-free in tcp_write_timer_handler().
With Eric's ref tracker, syzbot finally found a repro for
use-after-free in tcp_write_timer_handler() by kernel TCP
sockets. [0]
If SMC creates a kernel socket in __smc_create(), the kernel
socket is supposed to be freed in smc_clcsock_release() by
calling sock_release() when we close() the parent SMC socket.
However, at the end of smc_clcsock_release(), the kernel
socket…
Affected Packages4 packages
▶CVEListV5linux/linuxac7138746e14137a451f8539614cdd349153e0c0 — 1cc41c8acfc1ee30b4868559058db97fa44b0137+2
🔴Vulnerability Details
3GHSA▶
GHSA-3h9m-xfjq-9f2f: In the Linux kernel, the following vulnerability has been resolved:
smc: Fix use-after-free in tcp_write_timer_handler()↗2025-12-09
OSV▶
CVE-2023-53781: In the Linux kernel, the following vulnerability has been resolved: smc: Fix use-after-free in tcp_write_timer_handler()↗2025-12-09