CVE-2023-53809
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | 6.2.0-rc5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a recursive deadlock in the Linux kernel's l2tp_tunnel_register() function. It occurs when a file descriptor of a pppol2tp socket is passed as the file descriptor of a UDP socket, causing the system to attempt to acquire the same lock twice recursively, leading to a deadlock. This deadlock happens because the tunnel registration process tries to lock a resource that is already locked by the same task, causing the system to hang or freeze.
How can this vulnerability impact me? :
This vulnerability can cause a recursive deadlock in the Linux kernel, which may lead to system hangs or freezes when certain socket operations are performed. This can impact system stability and availability, potentially causing denial of service conditions on affected systems.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing lockdep warnings related to recursive locking in the kernel logs. Specifically, look for warnings about possible recursive locking involving sk_lock-AF_PPPOX and messages indicating a deadlock in l2tp_tunnel_register(). You can check the kernel log using the command: dmesg | grep -i 'recursive locking' or dmesg | grep -i 'l2tp_tunnel_register'. Additionally, running the provided repro program that creates a pppol2tp socket and attempts to connect it as shown in the CVE description can reproduce the deadlock warning.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation is to update the Linux kernel to a version that includes the patch fixing this issue, which ensures the tunnel is created before locking the pppol2tp socket, preventing the recursive deadlock. Until the patch is applied, avoid passing a pppol2tp socket file descriptor as a UDP socket file descriptor to prevent triggering the deadlock scenario.