CVE-2023-53577
BaseFortify
Publication date: 2025-10-04
Last updated on: 2026-03-23
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | From 6.2 (inc) to 6.4.10 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.45 (exc) |
| linux | linux_kernel | From 4.15 (inc) to 5.15.126 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-401 | The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the bpf cpumap feature where a kernel thread (kthread) may be stopped prematurely before a map update completes. This causes a warning because the XDP program has queued frames or skbs into a ring buffer that is not emptied when checked, leading to potential memory handling issues. The fix ensures the kthread is running before the map update returns, preventing the warning and avoiding dropping frames or skbs unnecessarily.
How can this vulnerability impact me? :
The vulnerability can cause warnings and potential instability in the Linux kernel when using the bpf cpumap feature with XDP programs, due to premature stopping of kernel threads and unemptied ring buffers. This could lead to unexpected behavior or resource leaks in systems relying on this functionality.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing kernel warnings related to the bpf cpumap kthread. Specifically, look for warnings similar to the following in the kernel logs: "WARNING: CPU: ... at kernel/bpf/cpumap.c:135" indicating issues with kthread not running before map update returns. You can check kernel logs using commands like `dmesg | grep cpumap` or `journalctl -k | grep cpumap` to find such warnings.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves ensuring that the Linux kernel is updated to a version that includes the fix for this vulnerability, which makes sure the per-CPU kthread is running before __cpu_map_entry_alloc() returns. Since the issue is resolved by a kernel patch, applying the updated kernel version is the recommended step. There are no alternative manual mitigations mentioned.