Skip to main content

CVE-2023-52582: Vulnerability in Linux Linux

High
VulnerabilityCVE-2023-52582cvecve-2023-52582
Published: Sat Mar 02 2024 (03/02/2024, 21:59:48 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: netfs: Only call folio_start_fscache() one time for each folio If a network filesystem using netfs implements a clamp_length() function, it can set subrequest lengths smaller than a page size. When we loop through the folios in netfs_rreq_unlock_folios() to set any folios to be written back, we need to make sure we only call folio_start_fscache() once for each folio. Otherwise, this simple testcase: mount -o fsc,rsize=1024,wsize=1024 127.0.0.1:/export /mnt/nfs dd if=/dev/zero of=/mnt/nfs/file.bin bs=4096 count=1 1+0 records in 1+0 records out 4096 bytes (4.1 kB, 4.0 KiB) copied, 0.0126359 s, 324 kB/s echo 3 > /proc/sys/vm/drop_caches cat /mnt/nfs/file.bin > /dev/null will trigger an oops similar to the following: page dumped because: VM_BUG_ON_FOLIO(folio_test_private_2(folio)) ------------[ cut here ]------------ kernel BUG at include/linux/netfs.h:44! ... CPU: 5 PID: 134 Comm: kworker/u16:5 Kdump: loaded Not tainted 6.4.0-rc5 ... RIP: 0010:netfs_rreq_unlock_folios+0x68e/0x730 [netfs] ... Call Trace: netfs_rreq_assess+0x497/0x660 [netfs] netfs_subreq_terminated+0x32b/0x610 [netfs] nfs_netfs_read_completion+0x14e/0x1a0 [nfs] nfs_read_completion+0x2f9/0x330 [nfs] rpc_free_task+0x72/0xa0 [sunrpc] rpc_async_release+0x46/0x70 [sunrpc] process_one_work+0x3bd/0x710 worker_thread+0x89/0x610 kthread+0x181/0x1c0 ret_from_fork+0x29/0x50

AI-Powered Analysis

AILast updated: 07/01/2025, 10:27:11 UTC

Technical Analysis

CVE-2023-52582 is a vulnerability identified in the Linux kernel's network filesystem (netfs) subsystem. The issue arises when a network filesystem using netfs implements a clamp_length() function that allows subrequest lengths smaller than a page size. In such cases, the kernel function netfs_rreq_unlock_folios() iterates through folios (memory pages) to mark them for write-back. However, due to improper handling, folio_start_fscache() is called multiple times on the same folio instead of just once. This leads to a kernel BUG triggered by the VM_BUG_ON_FOLIO check, causing a kernel oops or crash. The vulnerability is demonstrated by mounting an NFS share with specific read/write sizes, writing a small file, dropping caches, and then reading the file back, which triggers the kernel panic. The root cause is a logic error in the netfs code that mishandles folio reference counting or state transitions when sub-page sized requests are processed. This flaw can cause system instability or denial of service due to kernel crashes. There is no indication of remote code execution or privilege escalation, but the kernel panic can disrupt normal operations on affected systems. The vulnerability affects Linux kernel versions containing the faulty commit referenced by the given SHA1 hashes. No CVSS score has been assigned yet, and no known exploits are reported in the wild. The issue has been publicly disclosed and patched in recent kernel updates.

Potential Impact

For European organizations, the impact of CVE-2023-52582 primarily involves potential denial of service (DoS) conditions on Linux systems using network filesystems such as NFS with netfs. Organizations relying on Linux servers for file sharing, storage, or networked applications could experience unexpected kernel crashes leading to service interruptions, data access delays, or system reboots. This can affect critical infrastructure, enterprise file servers, cloud environments, and any system using netfs-based network filesystems with the vulnerable kernel versions. While the vulnerability does not appear to allow code execution or data corruption directly, the resulting instability can impact availability and operational continuity. In sectors such as finance, healthcare, manufacturing, and public services, where Linux-based network storage is common, this could disrupt workflows or cause downtime. Additionally, recovery from kernel panics may require manual intervention, increasing operational costs and risk of data loss if not properly managed. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to prevent potential exploitation or accidental triggering.

Mitigation Recommendations

European organizations should apply the following specific mitigation steps: 1) Identify Linux systems running kernels with the affected commit hashes or versions and prioritize patching with the latest stable kernel releases that include the fix for CVE-2023-52582. 2) Review network filesystem configurations, especially NFS mounts using netfs with clamp_length() implementations, and consider temporarily disabling or limiting sub-page sized I/O requests if possible. 3) Implement monitoring for kernel oops or crash logs related to netfs or folio operations to detect early signs of exploitation or accidental triggering. 4) In environments where immediate patching is not feasible, consider isolating vulnerable systems from critical network segments or limiting access to reduce risk. 5) Maintain regular backups and ensure recovery procedures are tested to minimize impact from unexpected reboots or data access issues. 6) Engage with Linux distribution vendors for timely updates and security advisories. 7) Educate system administrators about this vulnerability and the importance of kernel updates in network filesystem contexts. These steps go beyond generic advice by focusing on the specific subsystem (netfs), the nature of the bug (folio handling), and operational practices relevant to European enterprise environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-03-02T21:55:42.569Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9831c4522896dcbe7d1b

Added to database: 5/21/2025, 9:09:05 AM

Last enriched: 7/1/2025, 10:27:11 AM

Last updated: 8/9/2025, 6:45:35 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats