CVE-2023-53188
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-12-02
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 4.3 (inc) to 5.4.293 (exc) |
| linux | linux_kernel | From 5.5 (inc) to 5.10.237 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.181 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.25 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.2.12 (exc) |
| linux | linux_kernel | 6.3 |
| linux | linux_kernel | 6.3 |
| linux | linux_kernel | 6.3 |
| linux | linux_kernel | 6.3 |
| linux | linux_kernel | 6.3 |
| linux | linux_kernel | 6.3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-362 | The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a race condition in the Linux kernel's openvswitch networking component. It occurs when a network namespace is deleted while many parallel requests are sent to an HTTP server running in that namespace. During this process, the kernel may enter an infinite loop in the packet transmission code because the device's transmit queues are set to zero but packets are still forwarded to it. This can cause the CPU to get stuck, leading to a system hang or degraded performance.
How can this vulnerability impact me? :
The vulnerability can cause the host system's CPU to become stuck in an infinite loop, effectively hanging or severely degrading the performance of the system. This can disrupt network communication and services relying on openvswitch, potentially causing denial of service or instability in environments using network namespaces and openvswitch.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by reproducing the described conditions: setting up an Open vSwitch instance with network namespaces and veth pairs, then sending a large number of parallel requests (around 3000 curls) to a server in one namespace while deleting the other namespace in parallel. Detection involves observing if the host CPU gets stuck in an infinite loop, which may manifest as kernel CPU stuck messages. Specific commands include using curl to send parallel requests and monitoring kernel logs for CPU stuck warnings. However, no explicit detection commands are provided.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where the vulnerability is fixed. The fix updates the do_output function to handle devices without carrier properly and adds warnings to prevent infinite loops. Until the patch is applied, avoid deleting network namespaces while sending large parallel requests through Open vSwitch interfaces to prevent triggering the issue.