Cyber Posture

CVE-2023-53024

High

Published: 27 March 2025

Published
27 March 2025
Modified
22 January 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
EPSS Score 0.0003 8.7th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2023-53024 is a pointer leak vulnerability in the Linux kernel's BPF subsystem stemming from insufficient speculative store bypass (SSB) mitigation for Spectre v4. A prior mitigation inserted lfence instructions after initializing a stack slot with a pointer or spilling a pointer to the stack. However, it failed to address cases where a stack slot is first initialized with a pointer (requiring sanitization) and then overwritten with a scalar value. This allows the second write to be vulnerable to SSB, resulting in speculative pointer-as-scalar type confusion that enables leakage of the pointer's numerical value.

A local attacker with low privileges (PR:L) can exploit this by loading an unprivileged BPF program. The attack involves spilling a kernel pointer, such as the frame pointer, to a stack slot, overwriting it with a user-controlled scalar, and then using a branch-based cache side channel to leak pointer bits. For example, the provided BPF bytecode aliases the frame pointer, stores it to the stack (triggering an lfence), overwrites with a scalar (bypassing lfence due to prior initialization), and speculatively loads the pointer to encode bits in cache state via timed accesses. Repeating this recovers full 64-bit addresses on amd64, achieving high confidentiality impact (C:H) without integrity or availability disruption.

Kernel patches address this by extending sanitization to scalars overwriting stack slots that previously held pointers, inserting lfence instructions in these cases. Relevant stable commits include 01bdcc73dbe7be3ad4d4ee9a59b71e42f461a528, 81b3374944d201872cfcf82730a7860f8e7c31dd, aae109414a57ab4164218f36e2e4a17f027fcaaa, b0c89ef025562161242a7c19b213bd6b272e93df, and da75dec7c6617bddad418159ffebcb133f008262. The fix assumes pointer spills occur under register pressure from LLVM, minimizing performance impact on real-world BPF programs, and does not depend on environment flags like allow_uninit_stack or ptr_leaks to ensure consistent protection.

Details

CWE(s)
NVD-CWE-noinfo

Affected Products

linux
linux kernel
5.14, 6.2 · 4.19.207 — 4.19.272 · 5.4.146 — 5.4.231 · 5.10.56 — 5.10.166

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

This kernel pointer leak vulnerability in BPF enables local attackers to bypass KASLR via speculative execution side-channel, directly facilitating further kernel exploitation for privilege escalation.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

References