CVE-2023-52992: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: bpf: Skip task with pid=1 in send_signal_common() The following kernel panic can be triggered when a task with pid=1 attaches a prog that attempts to send killing signal to itself, also see [1] for more details: Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b CPU: 3 PID: 1 Comm: systemd Not tainted 6.1.0-09652-g59fe41b5255f #148 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x100/0x178 lib/dump_stack.c:106 panic+0x2c4/0x60f kernel/panic.c:275 do_exit.cold+0x63/0xe4 kernel/exit.c:789 do_group_exit+0xd4/0x2a0 kernel/exit.c:950 get_signal+0x2460/0x2600 kernel/signal.c:2858 arch_do_signal_or_restart+0x78/0x5d0 arch/x86/kernel/signal.c:306 exit_to_user_mode_loop kernel/entry/common.c:168 [inline] exit_to_user_mode_prepare+0x15f/0x250 kernel/entry/common.c:203 __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline] syscall_exit_to_user_mode+0x1d/0x50 kernel/entry/common.c:296 do_syscall_64+0x44/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x63/0xcd So skip task with pid=1 in bpf_send_signal_common() to avoid the panic. [1] https://lore.kernel.org/bpf/20221222043507.33037-1-sunhao.th@gmail.com
AI Analysis
Technical Summary
CVE-2023-52992 is a vulnerability identified in the Linux kernel related to the Berkeley Packet Filter (BPF) subsystem, specifically within the signal sending mechanism in the function send_signal_common(). The vulnerability arises when a task with process ID (pid) 1, typically the init process (such as systemd), attaches a BPF program that attempts to send a killing signal to itself. This action triggers a kernel panic with the message "Kernel panic - not syncing: Attempted to kill init!". The kernel panic occurs because the kernel does not properly handle the case where pid=1 is targeted in the signal sending logic, leading to an unrecoverable system crash. The root cause is that the function bpf_send_signal_common() does not skip the task with pid=1, which is critical for system stability. The fix involves explicitly skipping the task with pid=1 in this function to prevent the panic. This vulnerability affects Linux kernel versions prior to the patch and can cause a denial of service (DoS) by crashing the entire system. The vulnerability does not require user interaction but does require the ability to attach BPF programs and send signals, which typically implies some level of privilege or capability. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The vulnerability was publicly disclosed on March 27, 2025.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily in environments running vulnerable Linux kernel versions, especially on servers and critical infrastructure systems where systemd or similar init systems are used. A successful exploitation leads to a kernel panic and system crash, resulting in denial of service. This can disrupt business operations, cause downtime, and potentially lead to data loss if systems are not properly backed up or if the crash occurs during critical operations. Systems that rely heavily on BPF for monitoring, networking, or security functions may be more exposed. The impact is particularly severe for data centers, cloud providers, and enterprises with Linux-based infrastructure, as the init process is fundamental to system operation. Recovery from such a crash requires system reboot, which may not be feasible in high-availability environments without redundancy. Although exploitation requires the ability to attach BPF programs and send signals, which is typically restricted, insider threats or compromised privileged accounts could leverage this vulnerability. The lack of known exploits reduces immediate risk but does not eliminate the potential for future attacks.
Mitigation Recommendations
European organizations should promptly apply the official Linux kernel patches that address this vulnerability by skipping the task with pid=1 in bpf_send_signal_common(). Until patches are applied, organizations should restrict the ability to load or attach BPF programs to trusted and highly privileged users only, minimizing the attack surface. Implement strict access controls and monitoring on systems that allow BPF program loading, including audit logging of BPF-related activities. Employ kernel lockdown features or security modules (e.g., SELinux, AppArmor) to enforce policies that prevent unauthorized BPF program attachment. Regularly update and maintain Linux kernel versions to incorporate security fixes. In environments where patching is delayed, consider isolating critical systems or using kernel live patching solutions if available. Additionally, ensure robust incident response and recovery plans are in place to handle potential system crashes and minimize downtime.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2023-52992: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: bpf: Skip task with pid=1 in send_signal_common() The following kernel panic can be triggered when a task with pid=1 attaches a prog that attempts to send killing signal to itself, also see [1] for more details: Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b CPU: 3 PID: 1 Comm: systemd Not tainted 6.1.0-09652-g59fe41b5255f #148 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x100/0x178 lib/dump_stack.c:106 panic+0x2c4/0x60f kernel/panic.c:275 do_exit.cold+0x63/0xe4 kernel/exit.c:789 do_group_exit+0xd4/0x2a0 kernel/exit.c:950 get_signal+0x2460/0x2600 kernel/signal.c:2858 arch_do_signal_or_restart+0x78/0x5d0 arch/x86/kernel/signal.c:306 exit_to_user_mode_loop kernel/entry/common.c:168 [inline] exit_to_user_mode_prepare+0x15f/0x250 kernel/entry/common.c:203 __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline] syscall_exit_to_user_mode+0x1d/0x50 kernel/entry/common.c:296 do_syscall_64+0x44/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x63/0xcd So skip task with pid=1 in bpf_send_signal_common() to avoid the panic. [1] https://lore.kernel.org/bpf/20221222043507.33037-1-sunhao.th@gmail.com
AI-Powered Analysis
Technical Analysis
CVE-2023-52992 is a vulnerability identified in the Linux kernel related to the Berkeley Packet Filter (BPF) subsystem, specifically within the signal sending mechanism in the function send_signal_common(). The vulnerability arises when a task with process ID (pid) 1, typically the init process (such as systemd), attaches a BPF program that attempts to send a killing signal to itself. This action triggers a kernel panic with the message "Kernel panic - not syncing: Attempted to kill init!". The kernel panic occurs because the kernel does not properly handle the case where pid=1 is targeted in the signal sending logic, leading to an unrecoverable system crash. The root cause is that the function bpf_send_signal_common() does not skip the task with pid=1, which is critical for system stability. The fix involves explicitly skipping the task with pid=1 in this function to prevent the panic. This vulnerability affects Linux kernel versions prior to the patch and can cause a denial of service (DoS) by crashing the entire system. The vulnerability does not require user interaction but does require the ability to attach BPF programs and send signals, which typically implies some level of privilege or capability. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The vulnerability was publicly disclosed on March 27, 2025.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily in environments running vulnerable Linux kernel versions, especially on servers and critical infrastructure systems where systemd or similar init systems are used. A successful exploitation leads to a kernel panic and system crash, resulting in denial of service. This can disrupt business operations, cause downtime, and potentially lead to data loss if systems are not properly backed up or if the crash occurs during critical operations. Systems that rely heavily on BPF for monitoring, networking, or security functions may be more exposed. The impact is particularly severe for data centers, cloud providers, and enterprises with Linux-based infrastructure, as the init process is fundamental to system operation. Recovery from such a crash requires system reboot, which may not be feasible in high-availability environments without redundancy. Although exploitation requires the ability to attach BPF programs and send signals, which is typically restricted, insider threats or compromised privileged accounts could leverage this vulnerability. The lack of known exploits reduces immediate risk but does not eliminate the potential for future attacks.
Mitigation Recommendations
European organizations should promptly apply the official Linux kernel patches that address this vulnerability by skipping the task with pid=1 in bpf_send_signal_common(). Until patches are applied, organizations should restrict the ability to load or attach BPF programs to trusted and highly privileged users only, minimizing the attack surface. Implement strict access controls and monitoring on systems that allow BPF program loading, including audit logging of BPF-related activities. Employ kernel lockdown features or security modules (e.g., SELinux, AppArmor) to enforce policies that prevent unauthorized BPF program attachment. Regularly update and maintain Linux kernel versions to incorporate security fixes. In environments where patching is delayed, consider isolating critical systems or using kernel live patching solutions if available. Additionally, ensure robust incident response and recovery plans are in place to handle potential system crashes and minimize downtime.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-03-27T16:40:15.741Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982fc4522896dcbe6c7e
Added to database: 5/21/2025, 9:09:03 AM
Last enriched: 7/1/2025, 2:56:13 AM
Last updated: 8/3/2025, 12:55:18 AM
Views: 21
Related Threats
CVE-2025-8834: Cross Site Scripting in JCG Link-net LW-N915R
MediumCVE-2025-55159: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in tokio-rs slab
MediumCVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.