CVE-2023-53634
BaseFortify
Publication date: 2025-10-07
Last updated on: 2026-02-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.3 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's BPF (Berkeley Packet Filter) trampoline mechanism on arm64 architecture with BTI (Branch Target Identification) enabled. When the BPF_TRAMP_F_CALL_ORIG flag is set, the trampoline uses the BLR instruction to jump back to the instruction following the call site to invoke the patched function. Normally, this instruction is PACIASP, which is safe for BTI. However, if the instruction following the call site is not PACIASP or a BTI instruction (for example, an ADD instruction), a BTI exception is triggered, causing a kernel panic. The fix replaces the BLR instruction with RET to avoid the branch target check and prevent the exception.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to panic and crash when executing BPF programs on arm64 systems with BTI enabled, due to an unhandled BTI exception. This can lead to system instability, denial of service, and potential disruption of services relying on the kernel.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for kernel panic logs or unhandled 64-bit EL1h sync exceptions related to BTI errors in the Linux kernel, especially those mentioning bpf_trampoline or bpf_fentry_test1. Checking kernel logs (e.g., using 'dmesg' or 'journalctl -k') for messages containing 'BTI exception' or 'Unhandled 64-bit el1h sync exception' can help identify the issue. Example commands: 'dmesg | grep -i bti', 'journalctl -k | grep -i bti', or 'dmesg | grep -i bpf_trampoline'.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the BTI error on returning to patched functions in BPF trampolines is fixed. The fix involves replacing the BLR instruction with RET to bypass the branch target check. Until the kernel is updated, avoid running BPF programs that trigger this condition on BTI-enabled kernels to prevent kernel panics.