Skip to main content

CVE-2023-52707: Vulnerability in Linux Linux

High
VulnerabilityCVE-2023-52707cvecve-2023-52707
Published: Tue May 21 2024 (05/21/2024, 15:22:55 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: sched/psi: Fix use-after-free in ep_remove_wait_queue() If a non-root cgroup gets removed when there is a thread that registered trigger and is polling on a pressure file within the cgroup, the polling waitqueue gets freed in the following path: do_rmdir cgroup_rmdir kernfs_drain_open_files cgroup_file_release cgroup_pressure_release psi_trigger_destroy However, the polling thread still has a reference to the pressure file and will access the freed waitqueue when the file is closed or upon exit: fput ep_eventpoll_release ep_free ep_remove_wait_queue remove_wait_queue This results in use-after-free as pasted below. The fundamental problem here is that cgroup_file_release() (and consequently waitqueue's lifetime) is not tied to the file's real lifetime. Using wake_up_pollfree() here might be less than ideal, but it is in line with the comment at commit 42288cb44c4b ("wait: add wake_up_pollfree()") since the waitqueue's lifetime is not tied to file's one and can be considered as another special case. While this would be fixable by somehow making cgroup_file_release() be tied to the fput(), it would require sizable refactoring at cgroups or higher layer which might be more justifiable if we identify more cases like this. BUG: KASAN: use-after-free in _raw_spin_lock_irqsave+0x60/0xc0 Write of size 4 at addr ffff88810e625328 by task a.out/4404 CPU: 19 PID: 4404 Comm: a.out Not tainted 6.2.0-rc6 #38 Hardware name: Amazon EC2 c5a.8xlarge/, BIOS 1.0 10/16/2017 Call Trace: <TASK> dump_stack_lvl+0x73/0xa0 print_report+0x16c/0x4e0 kasan_report+0xc3/0xf0 kasan_check_range+0x2d2/0x310 _raw_spin_lock_irqsave+0x60/0xc0 remove_wait_queue+0x1a/0xa0 ep_free+0x12c/0x170 ep_eventpoll_release+0x26/0x30 __fput+0x202/0x400 task_work_run+0x11d/0x170 do_exit+0x495/0x1130 do_group_exit+0x100/0x100 get_signal+0xd67/0xde0 arch_do_signal_or_restart+0x2a/0x2b0 exit_to_user_mode_prepare+0x94/0x100 syscall_exit_to_user_mode+0x20/0x40 do_syscall_64+0x52/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd </TASK> Allocated by task 4404: kasan_set_track+0x3d/0x60 __kasan_kmalloc+0x85/0x90 psi_trigger_create+0x113/0x3e0 pressure_write+0x146/0x2e0 cgroup_file_write+0x11c/0x250 kernfs_fop_write_iter+0x186/0x220 vfs_write+0x3d8/0x5c0 ksys_write+0x90/0x110 do_syscall_64+0x43/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd Freed by task 4407: kasan_set_track+0x3d/0x60 kasan_save_free_info+0x27/0x40 ____kasan_slab_free+0x11d/0x170 slab_free_freelist_hook+0x87/0x150 __kmem_cache_free+0xcb/0x180 psi_trigger_destroy+0x2e8/0x310 cgroup_file_release+0x4f/0xb0 kernfs_drain_open_files+0x165/0x1f0 kernfs_drain+0x162/0x1a0 __kernfs_remove+0x1fb/0x310 kernfs_remove_by_name_ns+0x95/0xe0 cgroup_addrm_files+0x67f/0x700 cgroup_destroy_locked+0x283/0x3c0 cgroup_rmdir+0x29/0x100 kernfs_iop_rmdir+0xd1/0x140 vfs_rmdir+0xfe/0x240 do_rmdir+0x13d/0x280 __x64_sys_rmdir+0x2c/0x30 do_syscall_64+0x43/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd

AI-Powered Analysis

AILast updated: 07/01/2025, 06:10:56 UTC

Technical Analysis

CVE-2023-52707 is a use-after-free vulnerability identified in the Linux kernel's control group (cgroup) pressure stall information (PSI) subsystem, specifically within the ep_remove_wait_queue() function. The flaw arises when a non-root cgroup is removed while a thread is actively polling on a pressure file within that cgroup. During the removal process, the polling waitqueue is freed via a sequence of kernel calls (do_rmdir -> cgroup_rmdir -> kernfs_drain_open_files -> cgroup_file_release -> cgroup_pressure_release -> psi_trigger_destroy). However, the polling thread still retains a reference to the now-freed waitqueue and attempts to access it when the file is closed or the thread exits, leading to a use-after-free condition. This is fundamentally due to the lifetime of the waitqueue not being properly tied to the file's actual lifetime, causing a dangling pointer scenario. The kernel's Kernel Address Sanitizer (KASAN) detected this issue during testing, showing a write operation to freed memory in the ep_remove_wait_queue path. The vulnerability could potentially lead to kernel crashes or memory corruption, which might be exploited to escalate privileges or cause denial of service. The fix involves ensuring proper synchronization and lifetime management of waitqueues related to cgroup pressure files, though a full refactor to tie cgroup_file_release to file release (fput) was deemed complex and deferred. This vulnerability affects Linux kernel version 6.2.0-rc6 and likely other versions with similar PSI and cgroup implementations. No known exploits are currently reported in the wild.

Potential Impact

For European organizations, the impact of CVE-2023-52707 can be significant, especially for those relying heavily on Linux-based infrastructure, including cloud providers, data centers, and enterprises running containerized workloads or cgroup-based resource management. Exploitation of this use-after-free vulnerability could lead to kernel crashes (denial of service) or potentially privilege escalation if an attacker can manipulate the kernel memory state. This could disrupt critical services, cause downtime, and potentially allow attackers to gain unauthorized control over affected systems. Given the widespread use of Linux in European public sector, financial institutions, telecommunications, and manufacturing industries, the vulnerability poses a risk to operational continuity and data integrity. Additionally, organizations using Linux kernels with PSI for resource pressure monitoring may be more exposed. While no active exploits are known, the complexity of the vulnerability and its kernel-level nature mean that skilled attackers could develop exploits, particularly in environments where unprivileged users have access to cgroups. The vulnerability also raises concerns for cloud environments and virtualized infrastructure common in Europe, where multi-tenant isolation depends on kernel security.

Mitigation Recommendations

1. Immediate patching: Apply the official Linux kernel patches that address CVE-2023-52707 as soon as they become available from trusted sources or Linux distribution vendors. 2. Kernel version management: Upgrade to a Linux kernel version that includes the fix, avoiding use of release candidates or unpatched kernels in production. 3. Restrict cgroup usage: Limit the ability of unprivileged users or processes to create or remove cgroups, especially those that use PSI pressure files, to reduce the attack surface. 4. Monitor kernel logs: Enable and monitor kernel logs and KASAN reports to detect any anomalous behavior or crashes related to waitqueue handling. 5. Harden container environments: For containerized workloads, ensure runtime security policies prevent unauthorized cgroup manipulations. 6. Conduct security audits: Review system configurations and user privileges related to cgroup management to ensure minimal necessary access. 7. Use kernel live patching: Where available, employ live patching solutions to apply fixes without downtime. 8. Incident response readiness: Prepare for potential exploitation by having incident response plans that include kernel-level compromise scenarios. These mitigations go beyond generic advice by focusing on controlling cgroup lifecycle management and monitoring kernel-specific indicators.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-03-07T14:49:46.891Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9830c4522896dcbe73d8

Added to database: 5/21/2025, 9:09:04 AM

Last enriched: 7/1/2025, 6:10:56 AM

Last updated: 8/12/2025, 5:23:38 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats