Skip to main content

CVE-2023-52745: Vulnerability in Linux Linux

High
VulnerabilityCVE-2023-52745cvecve-2023-52745
Published: Tue May 21 2024 (05/21/2024, 15:23:06 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: IB/IPoIB: Fix legacy IPoIB due to wrong number of queues The cited commit creates child PKEY interfaces over netlink will multiple tx and rx queues, but some devices doesn't support more than 1 tx and 1 rx queues. This causes to a crash when traffic is sent over the PKEY interface due to the parent having a single queue but the child having multiple queues. This patch fixes the number of queues to 1 for legacy IPoIB at the earliest possible point in time. BUG: kernel NULL pointer dereference, address: 000000000000036b PGD 0 P4D 0 Oops: 0000 [#1] SMP CPU: 4 PID: 209665 Comm: python3 Not tainted 6.1.0_for_upstream_min_debug_2022_12_12_17_02 #1 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 RIP: 0010:kmem_cache_alloc+0xcb/0x450 Code: ce 7e 49 8b 50 08 49 83 78 10 00 4d 8b 28 0f 84 cb 02 00 00 4d 85 ed 0f 84 c2 02 00 00 41 8b 44 24 28 48 8d 4a 01 49 8b 3c 24 <49> 8b 5c 05 00 4c 89 e8 65 48 0f c7 0f 0f 94 c0 84 c0 74 b8 41 8b RSP: 0018:ffff88822acbbab8 EFLAGS: 00010202 RAX: 0000000000000070 RBX: ffff8881c28e3e00 RCX: 00000000064f8dae RDX: 00000000064f8dad RSI: 0000000000000a20 RDI: 0000000000030d00 RBP: 0000000000000a20 R08: ffff8882f5d30d00 R09: ffff888104032f40 R10: ffff88810fade828 R11: 736f6d6570736575 R12: ffff88810081c000 R13: 00000000000002fb R14: ffffffff817fc865 R15: 0000000000000000 FS: 00007f9324ff9700(0000) GS:ffff8882f5d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000000036b CR3: 00000001125af004 CR4: 0000000000370ea0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> skb_clone+0x55/0xd0 ip6_finish_output2+0x3fe/0x690 ip6_finish_output+0xfa/0x310 ip6_send_skb+0x1e/0x60 udp_v6_send_skb+0x1e5/0x420 udpv6_sendmsg+0xb3c/0xe60 ? ip_mc_finish_output+0x180/0x180 ? __switch_to_asm+0x3a/0x60 ? __switch_to_asm+0x34/0x60 sock_sendmsg+0x33/0x40 __sys_sendto+0x103/0x160 ? _copy_to_user+0x21/0x30 ? kvm_clock_get_cycles+0xd/0x10 ? ktime_get_ts64+0x49/0xe0 __x64_sys_sendto+0x25/0x30 do_syscall_64+0x3d/0x90 entry_SYSCALL_64_after_hwframe+0x46/0xb0 RIP: 0033:0x7f9374f1ed14 Code: 42 41 f8 ff 44 8b 4c 24 2c 4c 8b 44 24 20 89 c5 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b 7c 24 08 0f 05 <48> 3d 00 f0 ff ff 77 34 89 ef 48 89 44 24 08 e8 68 41 f8 ff 48 8b RSP: 002b:00007f9324ff7bd0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 00007f9324ff7cc8 RCX: 00007f9374f1ed14 RDX: 00000000000002fb RSI: 00007f93000052f0 RDI: 0000000000000030 RBP: 0000000000000000 R08: 00007f9324ff7d40 R09: 000000000000001c R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 R13: 000000012a05f200 R14: 0000000000000001 R15: 00007f9374d57bdc </TASK>

AI-Powered Analysis

AILast updated: 06/28/2025, 01:39:39 UTC

Technical Analysis

CVE-2023-52745 is a vulnerability identified in the Linux kernel related to the IP over InfiniBand (IPoIB) networking implementation, specifically affecting legacy IPoIB interfaces. The issue arises from incorrect handling of transmit (tx) and receive (rx) queue counts when creating child Partition Key (PKEY) interfaces over netlink. Some network devices do not support multiple tx and rx queues, but the vulnerable kernel code erroneously assigns multiple queues to child interfaces while the parent interface supports only a single queue. This mismatch leads to a kernel NULL pointer dereference and subsequent crash when traffic is transmitted over the affected PKEY interface. The vulnerability manifests as a kernel oops and system crash, impacting system stability and availability. The patch corrects this by enforcing a single queue count for legacy IPoIB interfaces at the earliest point in the interface creation process, preventing the mismatch and crash. The vulnerability affects multiple Linux kernel versions identified by specific commit hashes, and no known exploits have been reported in the wild as of the publication date. The vulnerability does not have an assigned CVSS score but is classified as a kernel-level denial of service triggered by malformed or unexpected network traffic on IPoIB interfaces.

Potential Impact

For European organizations, the primary impact of CVE-2023-52745 is on system availability and reliability, particularly for those using Linux-based systems with IPoIB networking in high-performance computing (HPC), data center, or specialized networking environments. A successful exploitation leads to kernel crashes causing system downtime, which can disrupt critical services and operations. Confidentiality and integrity impacts are minimal as the vulnerability does not provide direct code execution or privilege escalation capabilities. However, availability loss in production or research environments relying on InfiniBand networking can lead to significant operational and financial consequences. Organizations running Linux kernels with legacy IPoIB support in sectors such as scientific research, telecommunications, financial services, and cloud infrastructure may experience service interruptions. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to avoid potential future exploitation or accidental system crashes.

Mitigation Recommendations

1. Apply the official Linux kernel patch that fixes the queue count handling for legacy IPoIB interfaces as soon as it becomes available in your distribution's kernel updates. 2. For environments where IPoIB is not required, consider disabling IPoIB support in the kernel configuration or unloading the relevant kernel modules to eliminate exposure. 3. Monitor kernel logs for oops or crash messages related to IPoIB interfaces to detect potential exploitation or accidental triggering. 4. In virtualized or containerized environments, ensure that virtual network devices do not expose legacy IPoIB interfaces unnecessarily. 5. Conduct thorough testing of network interface configurations when upgrading kernels to detect any regressions or misconfigurations related to queue handling. 6. Maintain up-to-date backups and implement robust system recovery procedures to minimize downtime in case of crashes. 7. Engage with Linux distribution vendors or maintainers to track patch availability and deployment status.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-21T15:19:24.233Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9821c4522896dcbdd82a

Added to database: 5/21/2025, 9:08:49 AM

Last enriched: 6/28/2025, 1:39:39 AM

Last updated: 7/26/2025, 5:47:03 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats