Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The AI productivity paradox in software engineering: Balancing efficiency and human skill retention

      July 2, 2025

      The impact of gray work on software development

      July 2, 2025

      CSS Intelligence: Speculating On The Future Of A Smarter Language

      July 2, 2025

      Hallucinated code, real threat: How slopsquatting targets AI-assisted development

      July 1, 2025

      Xbox is cancelling Rare’s ‘Everwild’ and ZeniMax’s new MMORPG IP as part of broader cuts — with ‘Perfect Dark’ impacted as well

      July 2, 2025

      Microsoft is closing down Xbox studio The Initiative, with Perfect Dark killed as well — joining Everwild and ZeniMax’s new IP, and other unannounced projects

      July 2, 2025

      No, Microsoft and Xbox’s Phil Spencer isn’t stepping down any time soon — here’s the truth

      July 2, 2025

      Everwild’s cancellation has me worried for one of my favorite dev teams and Xbox itself — It needs creative new games to thrive and refresh its identity

      July 2, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Trust but Verify: The Curious Case of AI Hallucinations

      July 2, 2025
      Recent

      Trust but Verify: The Curious Case of AI Hallucinations

      July 2, 2025

      From Flow to Fabric: Connecting Power Automate to Microsoft Fabric

      July 2, 2025

      Flutter Web Hot Reload Has Landed – No More Refreshes!

      July 2, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Xbox is cancelling Rare’s ‘Everwild’ and ZeniMax’s new MMORPG IP as part of broader cuts — with ‘Perfect Dark’ impacted as well

      July 2, 2025
      Recent

      Xbox is cancelling Rare’s ‘Everwild’ and ZeniMax’s new MMORPG IP as part of broader cuts — with ‘Perfect Dark’ impacted as well

      July 2, 2025

      Microsoft is closing down Xbox studio The Initiative, with Perfect Dark killed as well — joining Everwild and ZeniMax’s new IP, and other unannounced projects

      July 2, 2025

      No, Microsoft and Xbox’s Phil Spencer isn’t stepping down any time soon — here’s the truth

      July 2, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2023-53136 – Linux af_unix Struct PID Leak Vulnerability

    CVE-2023-53136 – Linux af_unix Struct PID Leak Vulnerability

    May 2, 2025

    CVE ID : CVE-2023-53136

    Published : May 2, 2025, 4:15 p.m. | 34 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    af_unix: fix struct pid leaks in OOB support

    syzbot reported struct pid leak [1].

    Issue is that queue_oob() calls maybe_add_creds() which potentially
    holds a reference on a pid.

    But skb->destructor is not set (either directly or by calling
    unix_scm_to_skb())

    This means that subsequent kfree_skb() or consume_skb() would leak
    this reference.

    In this fix, I chose to fully support scm even for the OOB message.

    [1]
    BUG: memory leak
    unreferenced object 0xffff8881053e7f80 (size 128):
    comm “syz-executor242”, pid 5066, jiffies 4294946079 (age 13.220s)
    hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 …………….
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 …………….
    backtrace:
    [] alloc_pid+0x6a/0x560 kernel/pid.c:180
    [] copy_process+0x169f/0x26c0 kernel/fork.c:2285
    [] kernel_clone+0xf7/0x610 kernel/fork.c:2684
    [] __do_sys_clone+0x7c/0xb0 kernel/fork.c:2825
    [] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
    [] do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
    [] entry_SYSCALL_64_after_hwframe+0x63/0xcd

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2023-53137 – Linux Kernel Ext4 Directory Corruption Vulnerability
    Next Article CVE-2023-53135 – Riscv Linux Kernel Stack Out-of-Bounds Vulnerability

    Related Posts

    Security

    Cisco scores a perfect 10 – sadly for a critical flaw in its comms platform

    July 2, 2025
    Security

    Linux Servers Hijacked: Attackers Install Legitimate Proxy Software for Covert Operations

    July 2, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Cisco Patches CVE-2025-20188 (10.0 CVSS) in IOS XE That Enables Root Exploits via JWT

    Development

    CVE-2025-46753 – Cisco Webex Meeting Server Authentication Bypass

    Common Vulnerabilities and Exposures (CVEs)

    AI-Powered Personalization: Redefining the Future of Customer Experience✨

    Web Development

    Sitecore Search Source Types – Part I

    Development

    Highlights

    This OnePlus Open bundle deal gets you a $300 smartwatch for free – how to qualify

    June 26, 2025

    In addition to the free OnePlus Watch 2, slash $200 off a new OnePlus Open…

    Native Mica Effect Coming to Firefox Toolbar on Windows 11

    June 23, 2025

    Maximize Financial Efficiency with a Google Sheets Financial Extension: A Smart Solution for Managing Cash Flow Issues

    May 12, 2025

    Boost Cloud Efficiency: AWS Well-Architected Cost Tips

    June 9, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.