Skip to main content

CVE-2023-52761: Vulnerability in Linux Linux

High
VulnerabilityCVE-2023-52761cvecve-2023-52761
Published: Tue May 21 2024 (05/21/2024, 15:30:47 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: riscv: VMAP_STACK overflow detection thread-safe commit 31da94c25aea ("riscv: add VMAP_STACK overflow detection") added support for CONFIG_VMAP_STACK. If overflow is detected, CPU switches to `shadow_stack` temporarily before switching finally to per-cpu `overflow_stack`. If two CPUs/harts are racing and end up in over flowing kernel stack, one or both will end up corrupting each other state because `shadow_stack` is not per-cpu. This patch optimizes per-cpu overflow stack switch by directly picking per-cpu `overflow_stack` and gets rid of `shadow_stack`. Following are the changes in this patch - Defines an asm macro to obtain per-cpu symbols in destination register. - In entry.S, when overflow is detected, per-cpu overflow stack is located using per-cpu asm macro. Computing per-cpu symbol requires a temporary register. x31 is saved away into CSR_SCRATCH (CSR_SCRATCH is anyways zero since we're in kernel). Please see Links for additional relevant disccussion and alternative solution. Tested by `echo EXHAUST_STACK > /sys/kernel/debug/provoke-crash/DIRECT` Kernel crash log below Insufficient stack space to handle exception!/debug/provoke-crash/DIRECT Task stack: [0xff20000010a98000..0xff20000010a9c000] Overflow stack: [0xff600001f7d98370..0xff600001f7d99370] CPU: 1 PID: 205 Comm: bash Not tainted 6.1.0-rc2-00001-g328a1f96f7b9 #34 Hardware name: riscv-virtio,qemu (DT) epc : __memset+0x60/0xfc ra : recursive_loop+0x48/0xc6 [lkdtm] epc : ffffffff808de0e4 ra : ffffffff0163a752 sp : ff20000010a97e80 gp : ffffffff815c0330 tp : ff600000820ea280 t0 : ff20000010a97e88 t1 : 000000000000002e t2 : 3233206874706564 s0 : ff20000010a982b0 s1 : 0000000000000012 a0 : ff20000010a97e88 a1 : 0000000000000000 a2 : 0000000000000400 a3 : ff20000010a98288 a4 : 0000000000000000 a5 : 0000000000000000 a6 : fffffffffffe43f0 a7 : 00007fffffffffff s2 : ff20000010a97e88 s3 : ffffffff01644680 s4 : ff20000010a9be90 s5 : ff600000842ba6c0 s6 : 00aaaaaac29e42b0 s7 : 00fffffff0aa3684 s8 : 00aaaaaac2978040 s9 : 0000000000000065 s10: 00ffffff8a7cad10 s11: 00ffffff8a76a4e0 t3 : ffffffff815dbaf4 t4 : ffffffff815dbaf4 t5 : ffffffff815dbab8 t6 : ff20000010a9bb48 status: 0000000200000120 badaddr: ff20000010a97e88 cause: 000000000000000f Kernel panic - not syncing: Kernel stack overflow CPU: 1 PID: 205 Comm: bash Not tainted 6.1.0-rc2-00001-g328a1f96f7b9 #34 Hardware name: riscv-virtio,qemu (DT) Call Trace: [<ffffffff80006754>] dump_backtrace+0x30/0x38 [<ffffffff808de798>] show_stack+0x40/0x4c [<ffffffff808ea2a8>] dump_stack_lvl+0x44/0x5c [<ffffffff808ea2d8>] dump_stack+0x18/0x20 [<ffffffff808dec06>] panic+0x126/0x2fe [<ffffffff800065ea>] walk_stackframe+0x0/0xf0 [<ffffffff0163a752>] recursive_loop+0x48/0xc6 [lkdtm] SMP: stopping secondary CPUs ---[ end Kernel panic - not syncing: Kernel stack overflow ]---

AI-Powered Analysis

AILast updated: 07/01/2025, 06:27:40 UTC

Technical Analysis

CVE-2023-52761 is a vulnerability in the Linux kernel specifically affecting the RISC-V architecture's kernel stack overflow detection mechanism when CONFIG_VMAP_STACK is enabled. The vulnerability arises from a race condition between multiple CPUs (harts) that overflow their kernel stacks simultaneously. The original implementation introduced a 'shadow_stack' to temporarily handle overflow, but this shadow stack was not per-CPU, leading to potential corruption when two CPUs concurrently overflowed their kernel stacks. This could cause one or both CPUs to corrupt each other's state, resulting in kernel instability or crashes. The patch removes the shared shadow_stack and instead switches directly to a per-CPU overflow stack, ensuring thread safety and preventing cross-CPU state corruption. The fix involves defining an assembly macro to obtain per-CPU symbols and modifying the kernel entry assembly code to use this macro to select the correct per-CPU overflow stack. The vulnerability was demonstrated by a kernel crash triggered via the debug interface, showing a kernel panic due to stack overflow. This issue is specific to the RISC-V port of the Linux kernel and affects kernel versions around 6.1.0-rc2. No known exploits are reported in the wild yet, and no CVSS score has been assigned. The vulnerability impacts kernel stability and could lead to denial of service via kernel panic or system crash if exploited, especially in multi-core RISC-V systems running Linux with VMAP_STACK enabled.

Potential Impact

For European organizations, the impact of CVE-2023-52761 primarily concerns systems running Linux on RISC-V architecture with VMAP_STACK enabled. While RISC-V adoption in Europe is currently limited compared to x86 and ARM, it is growing in embedded systems, IoT devices, and specialized computing environments. Organizations using RISC-V Linux kernels in critical infrastructure, industrial control systems, or research environments could face system instability or denial of service due to kernel panics caused by this vulnerability. This could disrupt operations, cause data loss, or require costly system reboots and troubleshooting. Since the vulnerability involves kernel stack overflow handling, it could also complicate debugging and recovery processes. Although no direct remote exploitation or privilege escalation is indicated, the denial of service impact on multi-core RISC-V Linux systems could affect availability of services, particularly in environments relying on RISC-V for edge computing or embedded applications. European organizations developing or deploying RISC-V Linux systems should prioritize patching to maintain system reliability and avoid operational disruptions.

Mitigation Recommendations

1. Apply the official Linux kernel patch that replaces the shared shadow_stack with a per-CPU overflow stack as soon as it becomes available in your kernel distribution or upstream kernel source. 2. For organizations compiling their own kernels, ensure CONFIG_VMAP_STACK is enabled only if the patched kernel version is used. 3. Conduct thorough testing of multi-core RISC-V Linux systems under high stack usage scenarios to detect potential stack overflow issues. 4. Monitor kernel debug interfaces and logs for signs of stack overflow or kernel panics related to this vulnerability. 5. Limit access to kernel debug interfaces (e.g., /sys/kernel/debug) to trusted administrators to prevent accidental or malicious triggering of stack exhaustion. 6. For embedded or IoT devices using RISC-V Linux, coordinate with hardware and software vendors to ensure timely firmware and kernel updates. 7. Implement robust system monitoring and automated recovery mechanisms to minimize downtime in case of kernel panics. 8. Consider disabling VMAP_STACK if not strictly required and if doing so does not compromise other security or stability features, as a temporary workaround until patched kernels are deployed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-21T15:19:24.237Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9830c4522896dcbe74b1

Added to database: 5/21/2025, 9:09:04 AM

Last enriched: 7/1/2025, 6:27:40 AM

Last updated: 8/16/2025, 5:08:24 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats