CVE-2023-53825
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
09/12/2025
Última modificación:
09/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
kcm: Fix error handling for SOCK_DGRAM in kcm_sendmsg().<br />
<br />
syzkaller found a memory leak in kcm_sendmsg(), and commit c821a88bd720<br />
("kcm: Fix memory leak in error path of kcm_sendmsg()") suppressed it by<br />
updating kcm_tx_msg(head)->last_skb if partial data is copied so that the<br />
following sendmsg() will resume from the skb.<br />
<br />
However, we cannot know how many bytes were copied when we get the error.<br />
Thus, we could mess up the MSG_MORE queue.<br />
<br />
When kcm_sendmsg() fails for SOCK_DGRAM, we should purge the queue as we<br />
do so for UDP by udp_flush_pending_frames().<br />
<br />
Even without this change, when the error occurred, the following sendmsg()<br />
resumed from a wrong skb and the queue was messed up. However, we have<br />
yet to get such a report, and only syzkaller stumbled on it. So, this<br />
can be changed safely.<br />
<br />
Note this does not change SOCK_SEQPACKET behaviour.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/1ce8362b4ac6b8e65fd04a22ea37ec776ee1ec5b
- https://git.kernel.org/stable/c/21b467735b0888a8daa048f83d3b9b50fdab71ce
- https://git.kernel.org/stable/c/2e18493c421428a936946c452461b8e979088f17
- https://git.kernel.org/stable/c/55d2e7c1ab8eaa7b62575b8a4194132795d1f9fc
- https://git.kernel.org/stable/c/992b2ac783aad360b98ed9d4686e86176a20f6f1
- https://git.kernel.org/stable/c/a22730b1b4bf437c6bbfdeff5feddf54be4aeada
- https://git.kernel.org/stable/c/d4b8f380b0a041ee6a84fdac14127d8fe1dcad7b
- https://git.kernel.org/stable/c/e5b28ce127a690f3acc49a6a342e6c9442c9edd6



