
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-53634 affects the Linux kernel, specifically related to a BTI (Branch Target Identification) error that occurs when returning to patched functions in the BPF subsystem on ARM64 architectures. The vulnerability was discovered and reported through the kernel.org security tracking system (NVD).
The vulnerability occurs when BPFTRAMPFCALLORIG is set, where the BPF trampoline uses BLR to jump back to the instruction next to the call site to call the patched function. While this is safe when the instruction next to the call site is PACIASP in BTI-enabled kernels, a BTI exception is triggered when the call site is not followed by a PACIASP or BTI instruction. The issue manifests as an unhandled 64-bit el1h sync exception with ESR 0x0000000034000002, indicating a BTI violation (NVD).
When triggered, this vulnerability results in a kernel panic with an unhandled exception, causing system instability and potential denial of service. The issue specifically affects ARM64 architectures running BTI-enabled kernels with BPF functionality (NVD).
The fix involves replacing the BLR instruction with RET to bypass the branch target check when returning to the patched function. This solution has been implemented in the Linux kernel codebase (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."