CVE-2023-53296

Source
https://cve.org/CVERecord?id=CVE-2023-53296
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53296.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53296
Downstream
Published
2025-09-16T08:11:28.519Z
Modified
2026-04-11T12:46:44.398571Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
sctp: check send stream number after wait_for_sndbuf
Details

In the Linux kernel, the following vulnerability has been resolved:

sctp: check send stream number after waitforsndbuf

This patch fixes a corner case where the asoc out stream count may change after waitforsndbuf.

When the main thread in the client starts a connection, if its out stream count is set to N while the in stream count in the server is set to N - 2, another thread in the client keeps sending the msgs with stream number N - 1, and waits for sndbuf before processing INIT_ACK.

However, after processing INIT_ACK, the out stream count in the client is shrunk to N - 2, the same to the in stream count in the server. The crash occurs when the thread waiting for sndbuf is awake and sends the msg in a non-existing stream(N - 1), the call trace is as below:

KASAN: null-ptr-deref in range [0x0000000000000038-0x000000000000003f] Call Trace: <TASK> sctpcmdsendmsg net/sctp/smsideeffect.c:1114 [inline] sctpcmdinterpreter net/sctp/smsideeffect.c:1777 [inline] sctpsideeffects net/sctp/smsideeffect.c:1199 [inline] sctpdosm+0x197d/0x5310 net/sctp/smsideeffect.c:1170 sctpprimitiveSEND+0x9f/0xc0 net/sctp/primitive.c:163 sctpsendmsgtoasoc+0x10eb/0x1a30 net/sctp/socket.c:1868 sctpsendmsg+0x8d4/0x1d90 net/sctp/socket.c:2026 inetsendmsg+0x9d/0xe0 net/ipv4/afinet.c:825 socksendmsgnosec net/socket.c:722 [inline] socksendmsg+0xde/0x190 net/socket.c:745

The fix is to add an unlikely check for the send stream number after the thread wakes up from the waitforsndbuf.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53296.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5bbbbe32a43199c2b9ea5ea66fab6241c64beb51
Fixed
9346a1a21142357972a6f466ba6275ddc54b04ac
Fixed
0443fff49d6352160c200064156c25898bd9f58c
Fixed
b4b6dfad41aaae9e36e44327b18d5cf4b20dd2ce
Fixed
667eb99cf7c15fe5b0ecefe75cf658e20ef20c9f
Fixed
d2128636b303aa9cf065055402ee6697409a8837
Fixed
a615e7270318fa0b98bf1ff38daf6cf52d840312
Fixed
2584024b23552c00d95b50255e47bd18d306d31a

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53296.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.281
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.241
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.178
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.107
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.24
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.11

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53296.json"