CVE-2023-53490
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-10-02
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a race condition in the Linux kernel's Multipath TCP (mptcp) protocol between the disconnect (or shutdown) operation and the accept operation. Specifically, a race occurs because the mptcp_stream_accept() function relies on a subflow lock rather than the msk-level lock, which can lead to a socket being accepted after the listener socket lock is released but before destructive actions are taken. This race can cause a kernel NULL pointer dereference, resulting in a system crash (kernel panic). The fix involves temporarily removing the pending request socket from the accept queue to prevent the race condition.
How can this vulnerability impact me? :
This vulnerability can cause a kernel NULL pointer dereference leading to a system crash (kernel panic). This can result in denial of service, where affected systems become unstable or unavailable until rebooted or patched.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is addressed by changes in the Linux kernel that handle the accept queue for mptcp sockets to prevent race conditions. Immediate mitigation would involve updating the Linux kernel to a version that includes the fix for this issue, which removes the pending request socket from the accept queue temporarily to avoid racing accept() calls causing kernel NULL pointer dereferences.