Home

Description

In the Linux kernel, the following vulnerability has been resolved: ping: Fix potentail NULL deref for /proc/net/icmp. After commit dbca1596bbb0 ("ping: convert to RCU lookups, get rid of rwlock"), we use RCU for ping sockets, but we should use spinlock for /proc/net/icmp to avoid a potential NULL deref mentioned in the previous patch. Let's go back to using spinlock there. Note we can convert ping sockets to use hlist instead of hlist_nulls because we do not use SLAB_TYPESAFE_BY_RCU for ping sockets.

PUBLISHED Reserved 2025-12-24 | Published 2025-12-24 | Updated 2025-12-24 | Assigner Linux

Product status

Default status
unaffected

dbca1596bbb08318f5e3b3b99f8ca0a0d3830a65 (git) before 5a08a32e624908890aa0a2eb442bb6a7669891a8
affected

dbca1596bbb08318f5e3b3b99f8ca0a0d3830a65 (git) before 176cbb6da28f36506cc60a4bec4ab8df0c16713a
affected

dbca1596bbb08318f5e3b3b99f8ca0a0d3830a65 (git) before ab5fb73ffa01072b4d8031cc05801fa1cb653bee
affected

de3d723a3985f282a8c9e468d1e198616eb291c8 (git)
affected

Default status
affected

6.0
affected

Any version before 6.0
unaffected

6.1.24 (semver)
unaffected

6.2.11 (semver)
unaffected

6.3 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/5a08a32e624908890aa0a2eb442bb6a7669891a8

git.kernel.org/...c/176cbb6da28f36506cc60a4bec4ab8df0c16713a

git.kernel.org/...c/ab5fb73ffa01072b4d8031cc05801fa1cb653bee

cve.org (CVE-2023-53987)

nvd.nist.gov (CVE-2023-53987)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.