CVE-2023-53857Improper Resource Locking in Linux

Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 89.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 9

Description

In the Linux kernel, the following vulnerability has been resolved: bpf: bpf_sk_storage: Fix invalid wait context lockdep report './test_progs -t test_local_storage' reported a splat: [ 27.137569] ============================= [ 27.138122] [ BUG: Invalid wait context ] [ 27.138650] 6.5.0-03980-gd11ae1b16b0a #247 Tainted: G O [ 27.139542] ----------------------------- [ 27.140106] test_progs/1729 is trying to lock: [ 27.140713] ffff8883ef047b88 (stock_lock){-.-.}-{3:3}, at: local_lock_acquire+

Affected Packages4 packages

Linuxlinux/linux_kernel5.18.06.5.4
Debianlinux/linux_kernel< 6.5.6-1+1
CVEListV5linux/linuxb00fa38a9c1cba044a32a601b49a55a18ed719d1300415caa373a07782fcbc2f8d9429bc2dc27a47+2
debiandebian/linux< linux 6.5.6-1 (forky)

🔴Vulnerability Details

3
OSV
CVE-2023-53857: In the Linux kernel, the following vulnerability has been resolved: bpf: bpf_sk_storage: Fix invalid wait context lockdep report '2025-12-09
OSV
bpf: bpf_sk_storage: Fix invalid wait context lockdep report2025-12-09
GHSA
GHSA-rqrg-f936-7vv9: In the Linux kernel, the following vulnerability has been resolved: bpf: bpf_sk_storage: Fix invalid wait context lockdep report '2025-12-09

📋Vendor Advisories

2
Red Hat
kernel: bpf: bpf_sk_storage: Fix invalid wait context lockdep report2025-12-09
Debian
CVE-2023-53857: linux - In the Linux kernel, the following vulnerability has been resolved: bpf: bpf_sk...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-53857 Impact, Exploitability, and Mitigation Steps | Wiz