Skip to main content

CVE-2023-53121: Vulnerability in Linux Linux

High
VulnerabilityCVE-2023-53121cvecve-2023-53121
Published: Fri May 02 2025 (05/02/2025, 15:55:58 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: tcp: tcp_make_synack() can be called from process context tcp_rtx_synack() now could be called in process context as explained in 0a375c822497 ("tcp: tcp_rtx_synack() can be called from process context"). tcp_rtx_synack() might call tcp_make_synack(), which will touch per-CPU variables with preemption enabled. This causes the following BUG: BUG: using __this_cpu_add() in preemptible [00000000] code: ThriftIO1/5464 caller is tcp_make_synack+0x841/0xac0 Call Trace: <TASK> dump_stack_lvl+0x10d/0x1a0 check_preemption_disabled+0x104/0x110 tcp_make_synack+0x841/0xac0 tcp_v6_send_synack+0x5c/0x450 tcp_rtx_synack+0xeb/0x1f0 inet_rtx_syn_ack+0x34/0x60 tcp_check_req+0x3af/0x9e0 tcp_rcv_state_process+0x59b/0x2030 tcp_v6_do_rcv+0x5f5/0x700 release_sock+0x3a/0xf0 tcp_sendmsg+0x33/0x40 ____sys_sendmsg+0x2f2/0x490 __sys_sendmsg+0x184/0x230 do_syscall_64+0x3d/0x90 Avoid calling __TCP_INC_STATS() with will touch per-cpu variables. Use TCP_INC_STATS() which is safe to be called from context switch.

AI-Powered Analysis

AILast updated: 07/01/2025, 04:41:34 UTC

Technical Analysis

CVE-2023-53121 is a vulnerability identified in the Linux kernel's TCP stack, specifically involving the functions tcp_make_synack() and tcp_rtx_synack(). The issue arises because tcp_rtx_synack() can be invoked in process context, which was not the original design assumption. When tcp_rtx_synack() calls tcp_make_synack(), the latter accesses per-CPU variables using __this_cpu_add() with preemption enabled. This is problematic because __this_cpu_add() is unsafe to use in preemptible code, leading to kernel BUGs and potential system instability or crashes. The root cause is the incorrect use of __TCP_INC_STATS(), which touches per-CPU variables in a context where preemption is enabled. The recommended fix is to replace __TCP_INC_STATS() with TCP_INC_STATS(), which is safe to be called from contexts where preemption can occur. This vulnerability does not appear to allow direct code execution or privilege escalation but can cause kernel panics or denial of service due to BUGs triggered by improper per-CPU variable access in process context. The vulnerability affects Linux kernel versions identified by the commit hash 8336886f786fdacbc19b719c1f7ea91eb70706d4 and was published on May 2, 2025. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability primarily presents a risk of denial of service (DoS) through kernel panics or system crashes on Linux-based systems, which are widely used in servers, cloud infrastructure, and embedded devices. Systems handling critical network traffic, such as firewalls, routers, or servers running TCP/IP stacks, may experience instability or unexpected reboots, potentially disrupting business operations or services. Although it does not directly lead to privilege escalation or data breaches, the availability impact can be significant, especially for organizations relying on high uptime and network reliability. The vulnerability could be exploited by sending crafted TCP packets that trigger the problematic code path, causing the kernel BUG. This may affect network-facing systems and services, increasing the risk of targeted DoS attacks. Given the widespread use of Linux in European data centers, cloud providers, and enterprise environments, the impact could be broad if unpatched. However, the lack of known exploits and the technical complexity of triggering the bug may limit immediate risk.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to versions that include the fix for CVE-2023-53121, ensuring that tcp_make_synack() no longer uses __this_cpu_add() in preemptible contexts. Kernel updates should be applied promptly, especially on network-facing servers and infrastructure devices. In environments where immediate patching is not feasible, administrators should monitor kernel logs for BUG messages related to tcp_make_synack and tcp_rtx_synack to detect potential exploitation attempts or instability. Network-level mitigations could include filtering or rate-limiting suspicious TCP SYN-ACK retransmissions that might trigger the vulnerability. Additionally, organizations should review their incident response plans to handle potential DoS scenarios caused by kernel crashes. For embedded or specialized Linux devices, coordination with vendors to obtain patched firmware or kernel versions is critical. Finally, maintaining robust backup and recovery procedures will help mitigate operational impacts if systems become unstable due to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-05-02T15:51:43.555Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9830c4522896dcbe706e

Added to database: 5/21/2025, 9:09:04 AM

Last enriched: 7/1/2025, 4:41:34 AM

Last updated: 8/14/2025, 7:59:31 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats