๐Ÿ” CVE Alert

CVE-2023-53136

UNKNOWN 0.0

af_unix: fix struct pid leaks in OOB support

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: af_unix: fix struct pid leaks in OOB support syzbot reported struct pid leak [1]. Issue is that queue_oob() calls maybe_add_creds() which potentially holds a reference on a pid. But skb->destructor is not set (either directly or by calling unix_scm_to_skb()) This means that subsequent kfree_skb() or consume_skb() would leak this reference. In this fix, I chose to fully support scm even for the OOB message. [1] BUG: memory leak unreferenced object 0xffff8881053e7f80 (size 128): comm "syz-executor242", pid 5066, jiffies 4294946079 (age 13.220s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff812ae26a>] alloc_pid+0x6a/0x560 kernel/pid.c:180 [<ffffffff812718df>] copy_process+0x169f/0x26c0 kernel/fork.c:2285 [<ffffffff81272b37>] kernel_clone+0xf7/0x610 kernel/fork.c:2684 [<ffffffff812730cc>] __do_sys_clone+0x7c/0xb0 kernel/fork.c:2825 [<ffffffff849ad699>] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [<ffffffff849ad699>] do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80 [<ffffffff84a0008b>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 2, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
314001f0bf927015e459c9d387d62a231fe93af3 < f3969427fb06a2c3cd6efd7faab63505cfa76e76 314001f0bf927015e459c9d387d62a231fe93af3 < ac1968ac399205fda9ee3b18f7de7416cb3a5d0d 314001f0bf927015e459c9d387d62a231fe93af3 < a59d6306263c38e5c0592ea4451ca26a0778c947 314001f0bf927015e459c9d387d62a231fe93af3 < 2aab4b96900272885bc157f8b236abf1cdc02e08
Linux / Linux
5.15

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/f3969427fb06a2c3cd6efd7faab63505cfa76e76 git.kernel.org: https://git.kernel.org/stable/c/ac1968ac399205fda9ee3b18f7de7416cb3a5d0d git.kernel.org: https://git.kernel.org/stable/c/a59d6306263c38e5c0592ea4451ca26a0778c947 git.kernel.org: https://git.kernel.org/stable/c/2aab4b96900272885bc157f8b236abf1cdc02e08