CVE-2023-54176 — Improper Privilege Management in Linux
Severity
5.8MEDIUM
No vectorEPSS
0.0%
top 92.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 30
Description
In the Linux kernel, the following vulnerability has been resolved:
mptcp: stricter state check in mptcp_worker
As reported by Christoph, the mptcp protocol can run the
worker when the relevant msk socket is in an unexpected state:
connect()
// incoming reset + fastclose
// the mptcp worker is scheduled
mptcp_disconnect()
// msk is now CLOSED
listen()
mptcp_worker()
Leading to the following splat:
divide error: 0000 [#1] PREEMPT SMP
CPU: 1 PID: 21 Comm: kworker/1:0 Not tainted 6.3.0-rc1-gde…
Affected Packages4 packages
▶CVEListV5linux/linuxe16163b6e2b720fb74e5af758546f6dad27e6c9e — f0b4a4086cf27240fc621a560da9735159049dcc+4
🔴Vulnerability Details
3GHSA▶
GHSA-rpwv-q8h7-6mvf: In the Linux kernel, the following vulnerability has been resolved:
mptcp: stricter state check in mptcp_worker
As reported by Christoph, the mptcp↗2025-12-30
OSV▶
CVE-2023-54176: In the Linux kernel, the following vulnerability has been resolved: mptcp: stricter state check in mptcp_worker As reported by Christoph, the mptcp pr↗2025-12-30