CVE-2023-53857
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.5.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel relates to the bpf_sk_storage component where an invalid wait context lockdep report occurs. Specifically, the issue involves attempting to allocate memory (kzalloc) while holding a raw_spin_lock, which is unsafe in real-time (RT) contexts. The problem arises because the code tries to acquire a local_lock while already holding a raw_spin_lock, leading to potential kernel bugs or crashes. The patch fixes this by ensuring memory allocation happens before acquiring the lock, preventing unsafe kzalloc calls during the lock hold.
How can this vulnerability impact me? :
This vulnerability can cause kernel bugs or crashes due to improper locking and memory allocation in the Linux kernel's BPF subsystem. If exploited or triggered, it may lead to system instability or denial of service, especially in environments using BPF programs that interact with socket storage. However, the vulnerability is somewhat hypothetical and related to specific tracing contexts, so the practical impact depends on the usage of BPF features in your system.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing kernel logs for specific BUG messages related to invalid wait context lockdep reports. For example, checking dmesg or journalctl logs for messages similar to '[ BUG: Invalid wait context ]' and stack traces involving bpf_sk_storage or local_lock_acquire. Running the test program './test_progs -t test_local_storage' as indicated in the description may also reproduce the issue if the kernel is vulnerable.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this issue is fixed, as the vulnerability is resolved by a patch that avoids unsafe memory allocation after acquiring raw_spin_lock in bpf_sk_storage code paths. Avoid running untrusted BPF programs that use sk_storage or local storage features until the kernel is patched.