Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Psychology Of Color In UX Design And Digital Products

      August 15, 2025

      This week in AI dev tools: Claude Sonnet 4’s larger context window, ChatGPT updates, and more (August 15, 2025)

      August 15, 2025

      Sentry launches MCP monitoring tool

      August 14, 2025

      10 Benefits of Hiring a React.js Development Company (2025–2026 Edition)

      August 13, 2025

      14 secret phone codes that unlock hidden features on your Android and iPhone

      August 17, 2025

      Stop using AI for these 9 work tasks – here’s why

      August 17, 2025

      A smart sensor assessed my home’s risk of electrical fires, and I was impressed

      August 17, 2025

      I brought Samsung’s rugged Galaxy tablet on a hiking trip, and it weathered everything

      August 17, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      AI’s Hidden Thirst: The Water Behind Tech

      August 16, 2025
      Recent

      AI’s Hidden Thirst: The Water Behind Tech

      August 16, 2025

      Minesweeper game in 100 lines of pure JavaScript – easy tutorial

      August 16, 2025

      Maintaining Data Consistency with Laravel Database Transactions

      August 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      5 Best VPN for Lenovo Laptops to Enjoy the Web Safely

      August 16, 2025
      Recent

      5 Best VPN for Lenovo Laptops to Enjoy the Web Safely

      August 16, 2025

      3 Best Antivirus and Malware Protection Software

      August 16, 2025

      11 Best Antivirus Without Ads

      August 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2023-53136 – Linux af_unix Struct PID Leak Vulnerability

    CVE-2023-53136 – Linux af_unix Struct PID Leak Vulnerability

    May 2, 2025

    CVE ID : CVE-2023-53136

    Published : May 2, 2025, 4:15 p.m. | 34 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    af_unix: fix struct pid leaks in OOB support

    syzbot reported struct pid leak [1].

    Issue is that queue_oob() calls maybe_add_creds() which potentially
    holds a reference on a pid.

    But skb->destructor is not set (either directly or by calling
    unix_scm_to_skb())

    This means that subsequent kfree_skb() or consume_skb() would leak
    this reference.

    In this fix, I chose to fully support scm even for the OOB message.

    [1]
    BUG: memory leak
    unreferenced object 0xffff8881053e7f80 (size 128):
    comm “syz-executor242”, pid 5066, jiffies 4294946079 (age 13.220s)
    hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 …………….
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 …………….
    backtrace:
    [] alloc_pid+0x6a/0x560 kernel/pid.c:180
    [] copy_process+0x169f/0x26c0 kernel/fork.c:2285
    [] kernel_clone+0xf7/0x610 kernel/fork.c:2684
    [] __do_sys_clone+0x7c/0xb0 kernel/fork.c:2825
    [] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
    [] do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
    [] entry_SYSCALL_64_after_hwframe+0x63/0xcd

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2023-53137 – Linux Kernel Ext4 Directory Corruption Vulnerability
    Next Article CVE-2023-53135 – Riscv Linux Kernel Stack Out-of-Bounds Vulnerability

    Related Posts

    Development

    Russian Group EncryptHub Exploits MSC EvilTwin Vulnerability to Deploy Fickle Stealer Malware

    August 16, 2025
    Development

    ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure

    August 16, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2025

    Machine Learning

    Model Compression Without Compromise: Loop-Residual Neural Networks Show Comparable Results to Larger GPT-2 Variants Using Iterative Refinement

    Machine Learning

    CVE-2021-47664 – Cisco Authentication Bypass

    Common Vulnerabilities and Exposures (CVEs)

    ZOTAC sceglie Manjaro Linux e KDE per la sua nuova console portatile ZOTA GAMING ZONE

    Linux

    Highlights

    Development

    Apple Fined €150 Million by French Regulator Over Discriminatory ATT Consent Practices

    April 1, 2025

    Apple has been hit with a fine of €150 million ($162 million) by France’s competition…

    CVE-2025-48334 – BinaryCarpenter Woo Slider Pro Missing Authorization Vulnerability

    May 30, 2025

    CVE-2025-54652 – VMware Virtualization Path Traversal Vulnerability

    August 6, 2025

    How Memory Transforms AI Agents: Insights and Leading Solutions in 2025

    July 26, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.