CVE-2023-53585: In the Linux kernel, the following vulnerability has been resolved: bpf: reject unhashed sockets in bpf_sk_assign The
Summary
A vulnerability in the Linux kernel's bpf_sk_assign function (a BPF helper that assigns sockets to network packets) could cause a memory leak when unhashed UDP sockets (sockets not yet bound to a port) are used. The problem occurs because the function assumes a socket flag called SOCK_RCU_FREE stays constant, but this flag gets set when an unhashed socket is later bound to a port, breaking the function's memory management logic.
Solution / Mitigation
Fix the problem by rejecting unhashed sockets in bpf_sk_assign(). This matches the behaviour of __inet_lookup_skb which is ultimately the goal of bpf_sk_assign().
Vulnerability Details
5.5(medium)
EPSS: 0.0%
Classification
Original source: https://nvd.nist.gov/vuln/detail/CVE-2023-53585
First tracked: February 15, 2026 at 08:36 PM
Classified by LLM (prompt v3) · confidence: 95%