Skip to main content

CVE-2023-53088: Vulnerability in Linux Linux

High
VulnerabilityCVE-2023-53088cvecve-2023-53088
Published: Fri May 02 2025 (05/02/2025, 15:55:34 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: mptcp: fix UaF in listener shutdown As reported by Christoph after having refactored the passive socket initialization, the mptcp listener shutdown path is prone to an UaF issue. BUG: KASAN: use-after-free in _raw_spin_lock_bh+0x73/0xe0 Write of size 4 at addr ffff88810cb23098 by task syz-executor731/1266 CPU: 1 PID: 1266 Comm: syz-executor731 Not tainted 6.2.0-rc59af4eaa31c1f6c00c8f1e448ed99a45c66340dd5 #6 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 Call Trace: <TASK> dump_stack_lvl+0x6e/0x91 print_report+0x16a/0x46f kasan_report+0xad/0x130 kasan_check_range+0x14a/0x1a0 _raw_spin_lock_bh+0x73/0xe0 subflow_error_report+0x6d/0x110 sk_error_report+0x3b/0x190 tcp_disconnect+0x138c/0x1aa0 inet_child_forget+0x6f/0x2e0 inet_csk_listen_stop+0x209/0x1060 __mptcp_close_ssk+0x52d/0x610 mptcp_destroy_common+0x165/0x640 mptcp_destroy+0x13/0x80 __mptcp_destroy_sock+0xe7/0x270 __mptcp_close+0x70e/0x9b0 mptcp_close+0x2b/0x150 inet_release+0xe9/0x1f0 __sock_release+0xd2/0x280 sock_close+0x15/0x20 __fput+0x252/0xa20 task_work_run+0x169/0x250 exit_to_user_mode_prepare+0x113/0x120 syscall_exit_to_user_mode+0x1d/0x40 do_syscall_64+0x48/0x90 entry_SYSCALL_64_after_hwframe+0x72/0xdc The msk grace period can legitly expire in between the last reference count dropped in mptcp_subflow_queue_clean() and the later eventual access in inet_csk_listen_stop() After the previous patch we don't need anymore special-casing msk listener socket cleanup: the mptcp worker will process each of the unaccepted msk sockets. Just drop the now unnecessary code. Please note this commit depends on the two parent ones: mptcp: refactor passive socket initialization mptcp: use the workqueue to destroy unaccepted sockets

AI-Powered Analysis

AILast updated: 06/28/2025, 02:10:10 UTC

Technical Analysis

CVE-2023-53088 is a use-after-free (UaF) vulnerability identified in the Linux kernel's Multipath TCP (MPTCP) implementation, specifically in the listener shutdown path. MPTCP is an extension of TCP that allows multiple paths to be used simultaneously between two endpoints, improving redundancy and throughput. The vulnerability arises due to a race condition where the grace period for the msk (multipath socket) can expire between the last reference count decrement in the function mptcp_subflow_queue_clean() and a subsequent access in inet_csk_listen_stop(). This leads to a use-after-free condition where the kernel attempts to access memory that has already been freed, causing instability and potential kernel crashes. The issue was introduced after a refactoring of the passive socket initialization and is triggered during the shutdown of MPTCP listener sockets. The kernel's Kernel Address Sanitizer (KASAN) detected this bug, indicating a write of size 4 to a freed memory address during the execution of the syz-executor731 task, a fuzzing tool used for kernel testing. The vulnerability can cause kernel panics or denial of service (DoS) conditions due to corrupted kernel memory. The fix involves removing unnecessary special-case code for msk listener socket cleanup and relying on the MPTCP worker to process unaccepted msk sockets properly, preventing premature freeing of memory. This patch depends on prior commits that refactor passive socket initialization and use workqueues to destroy unaccepted sockets safely. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running vulnerable versions of the Linux kernel with MPTCP enabled or in use. Given Linux's widespread deployment in servers, cloud infrastructure, and embedded devices across Europe, exploitation could lead to kernel crashes and denial of service, disrupting critical services and applications. Organizations relying on MPTCP for network resilience or performance could experience instability or outages, impacting availability. While the vulnerability does not directly allow privilege escalation or remote code execution, the resulting kernel instability could be leveraged as part of a larger attack chain or cause significant operational disruption. Industries with high dependence on Linux-based infrastructure, such as telecommunications, finance, and cloud service providers, may face increased risk. Additionally, embedded systems and IoT devices running affected kernels could be impacted, potentially affecting industrial control systems or critical infrastructure. The lack of known exploits reduces immediate risk, but the vulnerability's presence in the kernel means that attackers with local access could trigger it, emphasizing the need for timely patching.

Mitigation Recommendations

European organizations should prioritize updating Linux kernel versions to those including the fix for CVE-2023-53088. Specifically, kernel versions incorporating the patches that refactor passive socket initialization and use workqueues for socket destruction should be deployed. System administrators should audit their environments to identify systems running vulnerable kernel versions, especially those utilizing MPTCP features. If MPTCP is not required, disabling it at the kernel configuration or runtime level can reduce the attack surface. For environments where kernel updates are delayed, applying kernel live patching solutions, if available, can mitigate risk without downtime. Monitoring kernel logs for KASAN reports or unusual socket shutdown errors can help detect attempts to trigger the vulnerability. Network segmentation and strict access controls should be enforced to limit local access to trusted users, as exploitation requires local code execution. Finally, organizations should maintain robust backup and recovery procedures to minimize impact from potential kernel crashes or DoS conditions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-05-02T15:51:43.551Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9821c4522896dcbdd98e

Added to database: 5/21/2025, 9:08:49 AM

Last enriched: 6/28/2025, 2:10:10 AM

Last updated: 7/28/2025, 7:25:37 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats