CVE-2023-54176
Use-After-Free in Linux Kernel MPTCP Worker Causes Kernel Panic
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's mptcp (Multipath TCP) protocol occurs because the mptcp worker can run when the associated msk socket is in an unexpected or invalid state, such as CLOSED. This improper state handling leads to a kernel crash (divide error) due to operations being performed on sockets that are not in a valid state. The fix involves stricter state checks before running the mptcp worker to prevent this issue.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel panic) due to a divide error when the mptcp worker operates on sockets in invalid states. Such crashes can lead to denial of service, system instability, and potential downtime for systems relying on the affected kernel version.