Skip to main content

CVE-2023-53072: Vulnerability in Linux Linux

High
VulnerabilityCVE-2023-53072cvecve-2023-53072
Published: Fri May 02 2025 (05/02/2025, 15:55:23 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: mptcp: use the workqueue to destroy unaccepted sockets Christoph reported a UaF at token lookup time after having refactored the passive socket initialization part: BUG: KASAN: use-after-free in __token_bucket_busy+0x253/0x260 Read of size 4 at addr ffff88810698d5b0 by task syz-executor653/3198 CPU: 1 PID: 3198 Comm: syz-executor653 Not tainted 6.2.0-rc59af4eaa31c1f6c00c8f1e448ed99a45c66340dd5 #6 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 Call Trace: <TASK> dump_stack_lvl+0x6e/0x91 print_report+0x16a/0x46f kasan_report+0xad/0x130 __token_bucket_busy+0x253/0x260 mptcp_token_new_connect+0x13d/0x490 mptcp_connect+0x4ed/0x860 __inet_stream_connect+0x80e/0xd90 tcp_sendmsg_fastopen+0x3ce/0x710 mptcp_sendmsg+0xff1/0x1a20 inet_sendmsg+0x11d/0x140 __sys_sendto+0x405/0x490 __x64_sys_sendto+0xdc/0x1b0 do_syscall_64+0x3b/0x90 entry_SYSCALL_64_after_hwframe+0x72/0xdc We need to properly clean-up all the paired MPTCP-level resources and be sure to release the msk last, even when the unaccepted subflow is destroyed by the TCP internals via inet_child_forget(). We can re-use the existing MPTCP_WORK_CLOSE_SUBFLOW infra, explicitly checking that for the critical scenario: the closed subflow is the MPC one, the msk is not accepted and eventually going through full cleanup. With such change, __mptcp_destroy_sock() is always called on msk sockets, even on accepted ones. We don't need anymore to transiently drop one sk reference at msk clone time. Please note this commit depends on the parent one: mptcp: refactor passive socket initialization

AI-Powered Analysis

AILast updated: 07/01/2025, 03:57:10 UTC

Technical Analysis

CVE-2023-53072 is a use-after-free (UaF) vulnerability identified in the Linux kernel's implementation of Multipath TCP (MPTCP). MPTCP is an extension of TCP that allows a single connection to use multiple paths to maximize resource usage and increase redundancy. The vulnerability arises from improper handling of socket destruction in the MPTCP passive socket initialization and cleanup process. Specifically, after a refactor of the passive socket initialization, the kernel failed to correctly manage the lifecycle of unaccepted subflow sockets, leading to a use-after-free condition during token lookup operations. This was detected by Kernel Address Sanitizer (KASAN) as a read of freed memory in the __token_bucket_busy function, triggered during MPTCP connection establishment and message sending. The root cause is that the MPTCP socket (msk) and its associated resources were not properly cleaned up when unaccepted subflows were destroyed by TCP internals via inet_child_forget(). The fix involves reusing the existing MPTCP_WORK_CLOSE_SUBFLOW infrastructure to ensure that the cleanup process explicitly checks if the closed subflow is the MPTCP one, whether the msk is unaccepted, and then performs a full cleanup. This guarantees that __mptcp_destroy_sock() is always called on msk sockets, preventing use-after-free scenarios. The patch also removes the need to transiently drop socket references during cloning, simplifying resource management. This vulnerability affects Linux kernel versions prior to the patch and is particularly relevant for systems using MPTCP, which is increasingly used in environments requiring robust multi-path networking such as data centers, mobile devices, and cloud infrastructure. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2023-53072 can be significant, especially for those relying on Linux-based infrastructure that employs MPTCP for enhanced network performance and reliability. Exploitation of this vulnerability could lead to kernel crashes or potential privilege escalation due to use-after-free conditions, undermining system stability and security. This could disrupt critical services, particularly in sectors like telecommunications, finance, healthcare, and cloud service providers where Linux servers are prevalent. Additionally, compromised systems could be leveraged for lateral movement or persistent footholds within networks. Given the kernel-level nature of the vulnerability, the confidentiality, integrity, and availability of affected systems could be severely impacted if exploited. The lack of known exploits suggests that the threat is currently theoretical but patching is urgent to prevent future attacks. Organizations with high network traffic and multi-path routing configurations are at higher risk.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions that include the patch for CVE-2023-53072 as soon as it becomes available. Until patches are applied, administrators should consider disabling MPTCP if it is not essential, as this will mitigate the attack surface. Monitoring kernel logs for unusual KASAN reports or socket-related errors can help detect exploitation attempts. Network segmentation and strict access controls should be enforced to limit exposure of vulnerable systems. Additionally, organizations should audit their use of MPTCP-enabled applications and services to understand the scope of potential impact. Employing kernel hardening techniques, such as enabling Kernel Page Table Isolation (KPTI) and Kernel Address Space Layout Randomization (KASLR), can reduce exploitation risk. Finally, maintaining up-to-date intrusion detection systems that can identify anomalous kernel behavior is recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-05-02T15:51:43.548Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9830c4522896dcbe6ed3

Added to database: 5/21/2025, 9:09:04 AM

Last enriched: 7/1/2025, 3:57:10 AM

Last updated: 8/1/2025, 1:04:15 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats