CVE-2023-53831 — Missing Synchronization in Linux
Severity
4.5MEDIUM
No vectorEPSS
0.0%
top 85.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 9
Description
In the Linux kernel, the following vulnerability has been resolved:
net: read sk->sk_family once in sk_mc_loop()
syzbot is playing with IPV6_ADDRFORM quite a lot these days,
and managed to hit the WARN_ON_ONCE(1) in sk_mc_loop()
We have many more similar issues to fix.
WARNING: CPU: 1 PID: 1593 at net/core/sock.c:782 sk_mc_loop+0x165/0x260
Modules linked in:
CPU: 1 PID: 1593 Comm: kworker/1:3 Not tainted 6.1.40-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, B…
Affected Packages4 packages
▶CVEListV5linux/linux7ad6848c7e81a603605fad3f3575841aab004eea — 7586a66b9c4f1b8a825ea1dfa3a91aad5cc7b89b+8
🔴Vulnerability Details
3GHSA▶
GHSA-83cq-hc8w-3693: In the Linux kernel, the following vulnerability has been resolved:
net: read sk->sk_family once in sk_mc_loop()
syzbot is playing with IPV6_ADDRFOR↗2025-12-09
OSV▶
CVE-2023-53831: In the Linux kernel, the following vulnerability has been resolved: net: read sk->sk_family once in sk_mc_loop() syzbot is playing with IPV6_ADDRFORM↗2025-12-09