Skip to main content

CVE-2023-52992: Vulnerability in Linux Linux

High
VulnerabilityCVE-2023-52992cvecve-2023-52992
Published: Thu Mar 27 2025 (03/27/2025, 16:43:27 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: bpf: Skip task with pid=1 in send_signal_common() The following kernel panic can be triggered when a task with pid=1 attaches a prog that attempts to send killing signal to itself, also see [1] for more details: Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b CPU: 3 PID: 1 Comm: systemd Not tainted 6.1.0-09652-g59fe41b5255f #148 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x100/0x178 lib/dump_stack.c:106 panic+0x2c4/0x60f kernel/panic.c:275 do_exit.cold+0x63/0xe4 kernel/exit.c:789 do_group_exit+0xd4/0x2a0 kernel/exit.c:950 get_signal+0x2460/0x2600 kernel/signal.c:2858 arch_do_signal_or_restart+0x78/0x5d0 arch/x86/kernel/signal.c:306 exit_to_user_mode_loop kernel/entry/common.c:168 [inline] exit_to_user_mode_prepare+0x15f/0x250 kernel/entry/common.c:203 __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline] syscall_exit_to_user_mode+0x1d/0x50 kernel/entry/common.c:296 do_syscall_64+0x44/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x63/0xcd So skip task with pid=1 in bpf_send_signal_common() to avoid the panic. [1] https://lore.kernel.org/bpf/20221222043507.33037-1-sunhao.th@gmail.com

AI-Powered Analysis

AILast updated: 07/01/2025, 02:56:13 UTC

Technical Analysis

CVE-2023-52992 is a vulnerability identified in the Linux kernel related to the Berkeley Packet Filter (BPF) subsystem, specifically within the signal sending mechanism in the function send_signal_common(). The vulnerability arises when a task with process ID (pid) 1, typically the init process (such as systemd), attaches a BPF program that attempts to send a killing signal to itself. This action triggers a kernel panic with the message "Kernel panic - not syncing: Attempted to kill init!". The kernel panic occurs because the kernel does not properly handle the case where pid=1 is targeted in the signal sending logic, leading to an unrecoverable system crash. The root cause is that the function bpf_send_signal_common() does not skip the task with pid=1, which is critical for system stability. The fix involves explicitly skipping the task with pid=1 in this function to prevent the panic. This vulnerability affects Linux kernel versions prior to the patch and can cause a denial of service (DoS) by crashing the entire system. The vulnerability does not require user interaction but does require the ability to attach BPF programs and send signals, which typically implies some level of privilege or capability. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The vulnerability was publicly disclosed on March 27, 2025.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily in environments running vulnerable Linux kernel versions, especially on servers and critical infrastructure systems where systemd or similar init systems are used. A successful exploitation leads to a kernel panic and system crash, resulting in denial of service. This can disrupt business operations, cause downtime, and potentially lead to data loss if systems are not properly backed up or if the crash occurs during critical operations. Systems that rely heavily on BPF for monitoring, networking, or security functions may be more exposed. The impact is particularly severe for data centers, cloud providers, and enterprises with Linux-based infrastructure, as the init process is fundamental to system operation. Recovery from such a crash requires system reboot, which may not be feasible in high-availability environments without redundancy. Although exploitation requires the ability to attach BPF programs and send signals, which is typically restricted, insider threats or compromised privileged accounts could leverage this vulnerability. The lack of known exploits reduces immediate risk but does not eliminate the potential for future attacks.

Mitigation Recommendations

European organizations should promptly apply the official Linux kernel patches that address this vulnerability by skipping the task with pid=1 in bpf_send_signal_common(). Until patches are applied, organizations should restrict the ability to load or attach BPF programs to trusted and highly privileged users only, minimizing the attack surface. Implement strict access controls and monitoring on systems that allow BPF program loading, including audit logging of BPF-related activities. Employ kernel lockdown features or security modules (e.g., SELinux, AppArmor) to enforce policies that prevent unauthorized BPF program attachment. Regularly update and maintain Linux kernel versions to incorporate security fixes. In environments where patching is delayed, consider isolating critical systems or using kernel live patching solutions if available. Additionally, ensure robust incident response and recovery plans are in place to handle potential system crashes and minimize downtime.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-03-27T16:40:15.741Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982fc4522896dcbe6c7e

Added to database: 5/21/2025, 9:09:03 AM

Last enriched: 7/1/2025, 2:56:13 AM

Last updated: 8/3/2025, 12:55:18 AM

Views: 21

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats