Skip to main content

CVE-2023-52740: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2023-52740cvecve-2023-52740
Published: Tue May 21 2024 (05/21/2024, 15:23:03 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: powerpc/64s/interrupt: Fix interrupt exit race with security mitigation switch The RFI and STF security mitigation options can flip the interrupt_exit_not_reentrant static branch condition concurrently with the interrupt exit code which tests that branch. Interrupt exit tests this condition to set MSR[EE|RI] for exit, then again in the case a soft-masked interrupt is found pending, to recover the MSR so the interrupt can be replayed before attempting to exit again. If the condition changes between these two tests, the MSR and irq soft-mask state will become corrupted, leading to warnings and possible crashes. For example, if the branch is initially true then false, MSR[EE] will be 0 but PACA_IRQ_HARD_DIS clear and EE may not get enabled, leading to warnings in irq_64.c.

AI-Powered Analysis

AILast updated: 07/01/2025, 06:12:15 UTC

Technical Analysis

CVE-2023-52740 is a vulnerability identified in the Linux kernel specifically affecting the powerpc/64s architecture's interrupt handling code. The issue arises from a race condition during the interrupt exit sequence when security mitigation switches (RFI and STF options) are toggled concurrently. These mitigation options control a static branch condition named interrupt_exit_not_reentrant, which is checked twice during the interrupt exit process to manage the Machine State Register (MSR) flags EE (External Interrupt Enable) and RI (Recoverable Interrupt). The first check sets the MSR flags for exit, and the second check, triggered if a soft-masked interrupt is pending, attempts to restore the MSR state to replay the interrupt before exiting again. If the static branch condition changes between these two checks, it can cause corruption of the MSR and interrupt soft-mask state. This corruption may manifest as kernel warnings and potentially lead to system crashes. For example, if the branch condition flips from true to false, the MSR[EE] bit may be cleared incorrectly while the PACA_IRQ_HARD_DIS flag remains clear, resulting in the EE bit not being re-enabled as expected. This inconsistency can destabilize interrupt handling and compromise system stability. The vulnerability is specific to the powerpc/64s platform and involves low-level kernel interrupt management code. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The issue was published on May 21, 2024, and is addressed by a kernel patch that fixes the race condition by ensuring consistent handling of the static branch condition during interrupt exit.

Potential Impact

For European organizations running Linux systems on powerpc/64s architectures, this vulnerability could lead to unexpected kernel warnings and system crashes due to corrupted interrupt handling states. Such instability can disrupt critical services, especially in environments relying on high availability and real-time processing, such as telecommunications, industrial control systems, and data centers. While the vulnerability does not directly expose confidentiality or integrity risks, the potential for denial of service through system crashes can impact availability significantly. Organizations using Linux kernels with the affected versions may experience operational disruptions, increased maintenance overhead, and potential downtime. Since no known exploits exist, the immediate risk is moderate, but unpatched systems remain vulnerable to accidental or targeted triggering of the race condition. The impact is more pronounced in sectors where powerpc/64s hardware is prevalent, including certain embedded systems and legacy infrastructure common in European industrial and governmental deployments.

Mitigation Recommendations

To mitigate CVE-2023-52740, European organizations should promptly apply the official Linux kernel patches that address the race condition in the interrupt exit code for powerpc/64s architectures. Kernel updates should be tested in staging environments to ensure compatibility and stability before deployment in production. Organizations should also audit their infrastructure to identify systems running the affected kernel versions on powerpc/64s hardware. For critical systems where immediate patching is not feasible, implementing monitoring for kernel warnings related to interrupt handling can provide early detection of potential issues. Additionally, limiting access to systems with powerpc/64s architectures and enforcing strict change management can reduce the risk of accidental triggering. Collaboration with hardware vendors and Linux distribution maintainers is recommended to ensure timely updates and support. Finally, organizations should maintain robust backup and recovery procedures to minimize downtime in case of crashes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-21T15:19:24.233Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9830c4522896dcbe7425

Added to database: 5/21/2025, 9:09:04 AM

Last enriched: 7/1/2025, 6:12:15 AM

Last updated: 8/12/2025, 6:41:08 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats