CVE-2023-53491
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2023-53491 was disclosed on October 1, 2025, affecting the Linux kernel. The vulnerability relates to the implementation of stack protector functionality in the start_kernel function. This security issue emerged from the need to control stack protector omission on a per-function basis, particularly affecting callers of boot_init_stack_canary (Ubuntu Security, RedHat Security).

Technical details

The vulnerability stems from the implementation of the __no_stack_protector function attribute in the Linux kernel. The issue specifically affects callers of boot_init_stack_canary when they are not compiled with -fno-stack-protector. In such cases, the canary stored in the stack slot of the caller will differ upon the call to boot_init_stack_canary, leading to a call to __stack_chk_fail() and subsequently causing a system panic. The vulnerability has been assigned a CVSS v3.1 score of 7.0, indicating a moderate to high severity level (RedHat Security).

Impact

When exploited, this vulnerability can cause system instability through kernel panics. The issue specifically affects the boot process and stack protection mechanisms, potentially compromising system security by interfering with stack canary protection mechanisms (RedHat Security).

Mitigation and workarounds

Various Linux distributions have addressed this vulnerability through updates. For instance, Ubuntu has marked several kernel versions as 'Not affected' in recent releases, while others require updates. Red Hat has identified affected versions and provided patches for Red Hat Enterprise Linux 7, 8, and 9, including both standard and RT kernel variants (Ubuntu Security, RedHat Security).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-71142N/AN/A
  • Linux KernelLinux Kernel
  • kernel-uki-virt-addons
NoNoJan 14, 2026
CVE-2025-71137N/AN/A
  • Linux KernelLinux Kernel
  • linux-azure-6.14
NoYesJan 14, 2026
CVE-2025-71135N/AN/A
  • Linux KernelLinux Kernel
  • kernel-debug-modules-internal
NoNoJan 14, 2026
CVE-2025-71134N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-debug-modules-core
NoNoJan 14, 2026
CVE-2025-71133N/AN/A
  • Linux KernelLinux Kernel
  • linux-ibm-5.15
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management