CVE-2023-54173
Use-After-Free in Linux Kernel BPF Causes Kernel Crash
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's BPF subsystem where preemption is not properly disabled in the bpf_event_output function. Because preemption remains enabled, a task can be interrupted and another task can enter the same critical section, leading to two tasks using the same perf_sample_data buffer simultaneously. This causes kernel crashes such as NULL pointer dereferences and page faults. The issue is fixed by disabling preemption in bpf_event_output to prevent such race conditions.
How can this vulnerability impact me? :
This vulnerability can cause kernel crashes, leading to system instability or denial of service. If exploited or triggered, it may cause unexpected system behavior or downtime due to kernel NULL pointer dereferences and page faults, impacting the reliability of systems running vulnerable Linux kernels.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by disabling preemption in the bpf_event_output function in the Linux kernel. To mitigate this vulnerability, you should update your Linux kernel to a version that includes this fix.