CVE-2023-53218

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Make it so that a waiting process can be aborted When sendmsg() creates an rxrpc call, it queues it to wait for a connection and channel to be assigned and then waits before it can start shovelling data as the encrypted DATA packet content includes a summary of the connection parameters. However, sendmsg() may get interrupted before a connection gets assigned and further sendmsg() calls will fail with EBUSY until an assignment is made. Fix this so that the call can at least be aborted without failing on EBUSY. We have to be careful here as sendmsg() mustn't be allowed to start the call timer if the call doesn't yet have a connection assigned as an oops may follow shortly thereafter.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

03 Dec 2025, 15:41

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0eb362d254814ce04848730bf32e75b8ee1a4d6c - () https://git.kernel.org/stable/c/0eb362d254814ce04848730bf32e75b8ee1a4d6c - Patch
References () https://git.kernel.org/stable/c/7161cf61c64e9e9413d790f2fa2b9dada71a2249 - () https://git.kernel.org/stable/c/7161cf61c64e9e9413d790f2fa2b9dada71a2249 - Patch
References () https://git.kernel.org/stable/c/876d96faacbc407daf4978d7ec95051b68f5344a - () https://git.kernel.org/stable/c/876d96faacbc407daf4978d7ec95051b68f5344a - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

15 Sep 2025, 15:22

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-15 15:15

Updated : 2025-12-03 15:41


NVD link : CVE-2023-53218

Mitre link : CVE-2023-53218

CVE.ORG link : CVE-2023-53218


JSON object : View

Products Affected

linux

  • linux_kernel