Skip to main content

CVE-2023-52743: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2023-52743cvecve-2023-52743
Published: Tue May 21 2024 (05/21/2024, 15:23:05 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ice: Do not use WQ_MEM_RECLAIM flag for workqueue When both ice and the irdma driver are loaded, a warning in check_flush_dependency is being triggered. This is due to ice driver workqueue being allocated with the WQ_MEM_RECLAIM flag and the irdma one is not. According to kernel documentation, this flag should be set if the workqueue will be involved in the kernel's memory reclamation flow. Since it is not, there is no need for the ice driver's WQ to have this flag set so remove it. Example trace: [ +0.000004] workqueue: WQ_MEM_RECLAIM ice:ice_service_task [ice] is flushing !WQ_MEM_RECLAIM infiniband:0x0 [ +0.000139] WARNING: CPU: 0 PID: 728 at kernel/workqueue.c:2632 check_flush_dependency+0x178/0x1a0 [ +0.000011] Modules linked in: bonding tls xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_reject_ipv4 nft_compat nft_cha in_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables nfnetlink bridge stp llc rfkill vfat fat intel_rapl_msr intel _rapl_common isst_if_common skx_edac nfit libnvdimm x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm irqbypass crct1 0dif_pclmul crc32_pclmul ghash_clmulni_intel rapl intel_cstate rpcrdma sunrpc rdma_ucm ib_srpt ib_isert iscsi_target_mod target_ core_mod ib_iser libiscsi scsi_transport_iscsi rdma_cm ib_cm iw_cm iTCO_wdt iTCO_vendor_support ipmi_ssif irdma mei_me ib_uverbs ib_core intel_uncore joydev pcspkr i2c_i801 acpi_ipmi mei lpc_ich i2c_smbus intel_pch_thermal ioatdma ipmi_si acpi_power_meter acpi_pad xfs libcrc32c sd_mod t10_pi crc64_rocksoft crc64 sg ahci ixgbe libahci ice i40e igb crc32c_intel mdio i2c_algo_bit liba ta dca wmi dm_mirror dm_region_hash dm_log dm_mod ipmi_devintf ipmi_msghandler fuse [ +0.000161] [last unloaded: bonding] [ +0.000006] CPU: 0 PID: 728 Comm: kworker/0:2 Tainted: G S 6.2.0-rc2_next-queue-13jan-00458-gc20aabd57164 #1 [ +0.000006] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0010.010620200716 01/06/2020 [ +0.000003] Workqueue: ice ice_service_task [ice] [ +0.000127] RIP: 0010:check_flush_dependency+0x178/0x1a0 [ +0.000005] Code: 89 8e 02 01 e8 49 3d 40 00 49 8b 55 18 48 8d 8d d0 00 00 00 48 8d b3 d0 00 00 00 4d 89 e0 48 c7 c7 e0 3b 08 9f e8 bb d3 07 01 <0f> 0b e9 be fe ff ff 80 3d 24 89 8e 02 00 0f 85 6b ff ff ff e9 06 [ +0.000004] RSP: 0018:ffff88810a39f990 EFLAGS: 00010282 [ +0.000005] RAX: 0000000000000000 RBX: ffff888141bc2400 RCX: 0000000000000000 [ +0.000004] RDX: 0000000000000001 RSI: dffffc0000000000 RDI: ffffffffa1213a80 [ +0.000003] RBP: ffff888194bf3400 R08: ffffed117b306112 R09: ffffed117b306112 [ +0.000003] R10: ffff888bd983088b R11: ffffed117b306111 R12: 0000000000000000 [ +0.000003] R13: ffff888111f84d00 R14: ffff88810a3943ac R15: ffff888194bf3400 [ +0.000004] FS: 0000000000000000(0000) GS:ffff888bd9800000(0000) knlGS:0000000000000000 [ +0.000003] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ +0.000003] CR2: 000056035b208b60 CR3: 000000017795e005 CR4: 00000000007706f0 [ +0.000003] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ +0.000003] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ +0.000002] PKRU: 55555554 [ +0.000003] Call Trace: [ +0.000002] <TASK> [ +0.000003] __flush_workqueue+0x203/0x840 [ +0.000006] ? mutex_unlock+0x84/0xd0 [ +0.000008] ? __pfx_mutex_unlock+0x10/0x10 [ +0.000004] ? __pfx___flush_workqueue+0x10/0x10 [ +0.000006] ? mutex_lock+0xa3/0xf0 [ +0.000005] ib_cache_cleanup_one+0x39/0x190 [ib_core] [ +0.000174] __ib_unregister_device+0x84/0xf0 [ib_core] [ +0.000094] ib_unregister_device+0x25/0x30 [ib_core] [ +0.000093] irdma_ib_unregister_device+0x97/0xc0 [irdma] [ +0.000064] ? __pfx_irdma_ib_unregister_device+0x10/0x10 [irdma] [ +0.000059] ? up_write+0x5c/0x90 [ +0.000005] irdma_remove+0x36/0x90 [irdma] [ +0.000062] auxiliary_bus_remove+0x32/0x50 [ +0.000007] device_r ---truncated---

AI-Powered Analysis

AILast updated: 07/01/2025, 06:12:57 UTC

Technical Analysis

CVE-2023-52743 is a vulnerability identified in the Linux kernel related to the handling of workqueues in the ice network driver when used alongside the irdma driver. Specifically, the issue arises because the ice driver's workqueue is allocated with the WQ_MEM_RECLAIM flag, whereas the irdma driver's workqueue is not. According to Linux kernel documentation, the WQ_MEM_RECLAIM flag should only be set if the workqueue participates in the kernel's memory reclamation process. Since the ice driver's workqueue does not engage in this process, the flag's presence is unnecessary and leads to a warning triggered by the kernel function check_flush_dependency. This warning indicates a potential mismanagement of workqueue dependencies, which could cause instability or unexpected behavior in kernel operations involving these drivers. The vulnerability manifests as kernel warnings and tracebacks, potentially leading to system instability or crashes under certain conditions when both drivers are loaded simultaneously. The root cause is a misconfiguration of workqueue flags, which has been addressed by removing the WQ_MEM_RECLAIM flag from the ice driver's workqueue allocation. This fix prevents the kernel warning and reduces the risk of related kernel-level issues. Although no known exploits are currently reported in the wild, the vulnerability affects Linux kernel versions identified by the commit hash 940b61af02f497fcd911b9e2d75c6b8cf76b92fd and similar builds. The vulnerability is technical and specific to kernel driver internals, primarily impacting systems using both the ice and irdma drivers, which are typically found in environments requiring advanced networking capabilities, such as data centers and enterprise servers.

Potential Impact

For European organizations, the impact of CVE-2023-52743 depends largely on the deployment of Linux systems utilizing the ice and irdma drivers. These drivers are commonly used in high-performance networking hardware, including Intel Ethernet controllers and RDMA-capable devices, which are prevalent in data centers, cloud infrastructure, and enterprise networking environments. The vulnerability could lead to kernel warnings and potential instability, causing service interruptions or degraded performance in critical network functions. This is particularly relevant for sectors relying on high availability and low latency, such as financial services, telecommunications, and cloud service providers. While the vulnerability does not currently have known exploits, the kernel instability could be leveraged by attackers to cause denial-of-service conditions or complicate incident response efforts. Additionally, organizations with strict compliance requirements around system stability and uptime may face operational risks if this issue is not addressed promptly. The impact is mitigated by the fact that exploitation does not appear straightforward and requires specific driver configurations, but the risk remains significant for environments running affected kernel versions with both drivers active.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to versions where this vulnerability has been patched, specifically those that have removed the WQ_MEM_RECLAIM flag from the ice driver's workqueue allocation. System administrators should audit their environments to identify systems running both the ice and irdma drivers simultaneously and verify kernel versions against the patched commits. If immediate patching is not feasible, temporarily unloading one of the conflicting drivers (if operationally acceptable) could reduce the risk of triggering the kernel warning and potential instability. Monitoring kernel logs for the specific warning messages related to check_flush_dependency can help detect if the issue is present. Additionally, organizations should implement rigorous testing of kernel updates in staging environments to ensure compatibility with their networking hardware and workloads. For critical infrastructure, consider deploying kernel live patching solutions to apply fixes without downtime. Finally, maintain close coordination with hardware vendors and Linux distribution maintainers to receive timely updates and advisories related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-21T15:19:24.233Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9830c4522896dcbe7446

Added to database: 5/21/2025, 9:09:04 AM

Last enriched: 7/1/2025, 6:12:57 AM

Last updated: 8/20/2025, 6:46:04 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats