CVE-2023-53790
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved by zeroing the allocated object from slab in the bpf memory allocator to prevent reuse of freed elements that can cause hard-lockup. Immediate mitigation would involve updating the Linux kernel to a version that includes this fix.
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's BPF memory allocator involves the reuse of freed memory elements without properly zeroing them first. Specifically, for htab maps, special fields in the map value (such as bpf_spin_lock) may be accessed during lookup even though they were not reinitialized after reuse. This can lead to a hard-lockup (system freeze) due to improper handling of these fields in memory after reuse.
How can this vulnerability impact me? :
The vulnerability can cause a hard-lockup of the system, meaning the CPU may become unresponsive due to improper memory reuse in the BPF subsystem. This can lead to system instability or crashes, potentially affecting availability and reliability of systems running vulnerable Linux kernels.