CVE-2024-53168
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-53168 is a Use-After-Free (UAF) vulnerability discovered in the Linux kernel's sunrpc kernel TCP socket implementation. The vulnerability was identified in December 2024 and affects Linux kernel versions from 4.2 up to (excluding) 6.6.64, from 6.7 up to (excluding) 6.11.11, and from 6.12 up to (excluding) 6.12.2 (NVD).

Technical details

The vulnerability occurs when a TCP socket in a network namespace (netns1) is shutdown and closed during xsdestroy operation, but the FIN message with acknowledgment is discarded. This causes the nfsd side to continue sending retransmission messages. When the TCP socket in netns_1 processes the received message, it sends the FIN message in the sending queue and re-establishes the TCP timer. The issue manifests when the network namespace is deleted, causing problems with the net structure accessed by TCP's timer handler function (Kernel Patch). The vulnerability has been assigned a CVSS v3.1 Base Score of 7.8 HIGH with vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

The vulnerability can lead to a Use-After-Free condition in the kernel's TCP socket handling, potentially resulting in system crashes, memory corruption, or privilege escalation. This poses significant risks to system stability and security, particularly in environments where network namespaces are frequently created and destroyed (NVD).

Mitigation and workarounds

The issue has been fixed in the Linux kernel through patches that implement proper network namespace reference counting for TCP kernel sockets. The fix involves holding netns refcnt for the TCP kernel socket as done in other modules. While this is described as an "ugly hack," it can be easily backported to earlier kernels. A more proper fix that cleans up the interfaces is planned but may be more difficult to backport (Kernel Patch).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-39730HIGH7.5
  • Linux KernelLinux Kernel
  • linux-aws
NoYesSep 07, 2025
CVE-2025-39732HIGH7
  • Linux KernelLinux Kernel
  • kernel-64k-debug-devel
NoYesSep 07, 2025
CVE-2025-39726MEDIUM5.5
  • Linux KernelLinux Kernel
  • kernel-zfcpdump-modules
NoYesSep 05, 2025
CVE-2025-39727N/AN/A
  • Linux KernelLinux Kernel
  • linux-raspi
NoYesSep 07, 2025
CVE-2025-39725N/AN/A
  • Linux KernelLinux Kernel
  • kernel-firmware
NoYesSep 05, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management