CVE-2023-53218

Updated: 2025-12-14 03:54:38.442142

Description:

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Make it so that a waiting process can be aborted When sendmsg() creates an rxrpc call, it queues it to wait for a connection and channel to be assigned and then waits before it can start shovelling data as the encrypted DATA packet content includes a summary of the connection parameters. However, sendmsg() may get interrupted before a connection gets assigned and further sendmsg() calls will fail with EBUSY until an assignment is made. Fix this so that the call can at least be aborted without failing on EBUSY. We have to be careful here as sendmsg() mustn't be allowed to start the call timer if the call doesn't yet have a connection assigned as an oops may follow shortly thereafter.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.8 HIGH Released CLSA-2026:1767864313 2026-01-08 09:45:36
CentOS 8.4 ELS kernel 4.18.0 7.8 HIGH Not Vulnerable 2025-12-15 12:00:26
CentOS 8.5 ELS kernel 4.18.0 7.8 HIGH Not Vulnerable 2025-12-15 12:00:27
Ubuntu 16.04 ELS linux-hwe 4.15.0 7.8 HIGH Needs Triage 2025-12-14 07:45:14
Ubuntu 18.04 ELS linux 4.15.0 7.8 HIGH Needs Triage 2025-12-14 07:56:59