CVE-2023-54112

Source
https://cve.org/CVERecord?id=CVE-2023-54112
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54112.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-54112
Downstream
Related
Published
2025-12-24T13:06:34.854Z
Modified
2026-03-31T17:29:53.280129621Z
Summary
kcm: Fix memory leak in error path of kcm_sendmsg()
Details

In the Linux kernel, the following vulnerability has been resolved:

kcm: Fix memory leak in error path of kcm_sendmsg()

syzbot reported a memory leak like below:

BUG: memory leak unreferenced object 0xffff88810b088c00 (size 240): comm "syz-executor186", pid 5012, jiffies 4294943306 (age 13.680s) hex dump (first 32 bytes): 00 89 08 0b 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff83e5d5ff>] __allocskb+0x1ef/0x230 net/core/skbuff.c:634 [<ffffffff84606e59>] allocskb include/linux/skbuff.h:1289 [inline] [<ffffffff84606e59>] kcmsendmsg+0x269/0x1050 net/kcm/kcmsock.c:815 [<ffffffff83e479c6>] socksendmsgnosec net/socket.c:725 [inline] [<ffffffff83e479c6>] socksendmsg+0x56/0xb0 net/socket.c:748 [<ffffffff83e47f55>] ____sys_sendmsg+0x365/0x470 net/socket.c:2494 [<ffffffff83e4c389>] ___sys_sendmsg+0xc9/0x130 net/socket.c:2548 [<ffffffff83e4c536>] _syssendmsg+0xa6/0x120 net/socket.c:2577 [<ffffffff84ad7bb8>] dosyscallx64 arch/x86/entry/common.c:50 [inline] [<ffffffff84ad7bb8>] dosyscall64+0x38/0xb0 arch/x86/entry/common.c:80 [<ffffffff84c0008b>] entrySYSCALL64afterhwframe+0x63/0xcd

In kcmsendmsg(), kcmtxmsg(head)->lastskb is used as a cursor to append newly allocated skbs to 'head'. If some bytes are copied, an error occurred, and jumped to outerror label, 'lastskb' is left unmodified. A later kcmsendmsg() will use an obsoleted 'lastskb' reference, corrupting the 'head' frag_list and causing the leak.

This patch fixes this issue by properly updating the last allocated skb in 'last_skb'.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54112.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ab7ac4eb9832e32a09f4e8042705484d2fb0aad3
Fixed
8dc7eb757b1652b82725f32e0c89a1e9f6c0e13b
Fixed
5e5554389397e98fafb9efe395d8b4830dd5f042
Fixed
479c71cda14b3c3a6515773faa39055333eaa2b7
Fixed
33db24ad811b3576a0c2f8862506763f2be925b0
Fixed
97275339c34cfbccd65e87bc38fd910ae66c48ba
Fixed
16989de75497574b5fafd174c0c233d5a86858b7
Fixed
af8085e0fc3207ecbf8b9e7a635c790e36d058c6
Fixed
c821a88bd720b0046433173185fd841a100d44ad

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54112.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.6.0
Fixed
4.14.326
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.295
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.257
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.195
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.132
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.54
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.5.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54112.json"