We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-53136

af_unix: fix struct pid leaks in OOB support



Description

In the Linux kernel, the following vulnerability has been resolved: af_unix: fix struct pid leaks in OOB support syzbot reported struct pid leak [1]. Issue is that queue_oob() calls maybe_add_creds() which potentially holds a reference on a pid. But skb->destructor is not set (either directly or by calling unix_scm_to_skb()) This means that subsequent kfree_skb() or consume_skb() would leak this reference. In this fix, I chose to fully support scm even for the OOB message. [1] BUG: memory leak unreferenced object 0xffff8881053e7f80 (size 128): comm "syz-executor242", pid 5066, jiffies 4294946079 (age 13.220s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff812ae26a>] alloc_pid+0x6a/0x560 kernel/pid.c:180 [<ffffffff812718df>] copy_process+0x169f/0x26c0 kernel/fork.c:2285 [<ffffffff81272b37>] kernel_clone+0xf7/0x610 kernel/fork.c:2684 [<ffffffff812730cc>] __do_sys_clone+0x7c/0xb0 kernel/fork.c:2825 [<ffffffff849ad699>] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [<ffffffff849ad699>] do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80 [<ffffffff84a0008b>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

Reserved 2025-05-02 | Published 2025-05-02 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

314001f0bf927015e459c9d387d62a231fe93af3 before f3969427fb06a2c3cd6efd7faab63505cfa76e76
affected

314001f0bf927015e459c9d387d62a231fe93af3 before ac1968ac399205fda9ee3b18f7de7416cb3a5d0d
affected

314001f0bf927015e459c9d387d62a231fe93af3 before a59d6306263c38e5c0592ea4451ca26a0778c947
affected

314001f0bf927015e459c9d387d62a231fe93af3 before 2aab4b96900272885bc157f8b236abf1cdc02e08
affected

Default status
affected

5.15
affected

Any version before 5.15
unaffected

5.15.103
unaffected

6.1.20
unaffected

6.2.7
unaffected

6.3
unaffected

References

git.kernel.org/...c/f3969427fb06a2c3cd6efd7faab63505cfa76e76

git.kernel.org/...c/ac1968ac399205fda9ee3b18f7de7416cb3a5d0d

git.kernel.org/...c/a59d6306263c38e5c0592ea4451ca26a0778c947

git.kernel.org/...c/2aab4b96900272885bc157f8b236abf1cdc02e08

cve.org (CVE-2023-53136)

nvd.nist.gov (CVE-2023-53136)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2023-53136

Support options

Helpdesk Chat, Email, Knowledgebase