Skip to main content

CVE-2023-52977: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2023-52977cvecve-2023-52977
Published: Thu Mar 27 2025 (03/27/2025, 16:43:17 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix flow memory leak in ovs_flow_cmd_new Syzkaller reports a memory leak of new_flow in ovs_flow_cmd_new() as it is not freed when an allocation of a key fails. BUG: memory leak unreferenced object 0xffff888116668000 (size 632): comm "syz-executor231", pid 1090, jiffies 4294844701 (age 18.871s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000defa3494>] kmem_cache_zalloc include/linux/slab.h:654 [inline] [<00000000defa3494>] ovs_flow_alloc+0x19/0x180 net/openvswitch/flow_table.c:77 [<00000000c67d8873>] ovs_flow_cmd_new+0x1de/0xd40 net/openvswitch/datapath.c:957 [<0000000010a539a8>] genl_family_rcv_msg_doit+0x22d/0x330 net/netlink/genetlink.c:739 [<00000000dff3302d>] genl_family_rcv_msg net/netlink/genetlink.c:783 [inline] [<00000000dff3302d>] genl_rcv_msg+0x328/0x590 net/netlink/genetlink.c:800 [<000000000286dd87>] netlink_rcv_skb+0x153/0x430 net/netlink/af_netlink.c:2515 [<0000000061fed410>] genl_rcv+0x24/0x40 net/netlink/genetlink.c:811 [<000000009dc0f111>] netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline] [<000000009dc0f111>] netlink_unicast+0x545/0x7f0 net/netlink/af_netlink.c:1339 [<000000004a5ee816>] netlink_sendmsg+0x8e7/0xde0 net/netlink/af_netlink.c:1934 [<00000000482b476f>] sock_sendmsg_nosec net/socket.c:651 [inline] [<00000000482b476f>] sock_sendmsg+0x152/0x190 net/socket.c:671 [<00000000698574ba>] ____sys_sendmsg+0x70a/0x870 net/socket.c:2356 [<00000000d28d9e11>] ___sys_sendmsg+0xf3/0x170 net/socket.c:2410 [<0000000083ba9120>] __sys_sendmsg+0xe5/0x1b0 net/socket.c:2439 [<00000000c00628f8>] do_syscall_64+0x30/0x40 arch/x86/entry/common.c:46 [<000000004abfdcf4>] entry_SYSCALL_64_after_hwframe+0x61/0xc6 To fix this the patch rearranges the goto labels to reflect the order of object allocations and adds appropriate goto statements on the error paths. Found by Linux Verification Center (linuxtesting.org) with Syzkaller.

AI-Powered Analysis

AILast updated: 06/28/2025, 01:55:16 UTC

Technical Analysis

CVE-2023-52977 is a memory leak vulnerability identified in the Linux kernel's Open vSwitch (OVS) component, specifically within the ovs_flow_cmd_new() function. Open vSwitch is a multilayer virtual switch commonly used to manage network traffic in virtualized environments and cloud infrastructures. The vulnerability arises when the function attempts to allocate memory for a new flow entry (new_flow) but fails to free this memory if a subsequent allocation of a key fails. This results in a memory leak where allocated memory remains unreleased, potentially leading to resource exhaustion over time. The issue was discovered using Syzkaller, a kernel fuzzing tool, which detected that the new_flow object was not freed upon allocation failure, as evidenced by kernel debug logs showing unreferenced objects and backtraces. The patch to fix this vulnerability involves rearranging the error handling code paths and adding appropriate goto statements to ensure that all allocated memory is properly freed on error conditions. The affected Linux kernel versions include multiple commits identified by their hashes, indicating that the flaw existed across several recent kernel builds prior to the fix. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. However, the vulnerability impacts the Open vSwitch datapath code, which is critical for network packet processing in many Linux-based systems, especially those deployed in data centers and cloud environments.

Potential Impact

For European organizations, the impact of CVE-2023-52977 primarily concerns environments that utilize Linux-based virtualization and cloud infrastructure relying on Open vSwitch for network traffic management. Memory leaks in kernel components can degrade system performance and stability over time, potentially leading to denial of service (DoS) conditions if memory exhaustion occurs. This can disrupt critical services, especially in data centers, cloud service providers, and enterprises running large-scale virtualized networks. While the vulnerability does not directly allow code execution or privilege escalation, the resulting resource depletion could be exploited by attackers to cause service interruptions or degrade network performance. This is particularly relevant for sectors with high dependency on network reliability such as finance, telecommunications, healthcare, and government institutions across Europe. Additionally, organizations running multi-tenant cloud environments may face increased risk as attackers could attempt to trigger the leak to impact co-hosted services. The absence of known exploits reduces immediate risk, but the widespread use of Linux and Open vSwitch in European IT infrastructure means that unpatched systems remain vulnerable to potential future exploitation or accidental service degradation.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel versions to include the patch that fixes CVE-2023-52977. Specifically, kernel updates that rearrange error handling in ovs_flow_cmd_new() to properly free memory on allocation failures must be applied promptly. System administrators should audit their environments to identify the use of Open vSwitch and verify kernel versions against the affected commits. In addition to patching, monitoring system memory usage and kernel logs for signs of memory leaks or abnormal resource consumption related to OVS is recommended. Implementing resource limits and alerting mechanisms can help detect potential exploitation attempts or inadvertent memory exhaustion. For cloud providers and virtualized environments, isolating tenants and applying strict resource quotas can mitigate the impact of memory leaks triggered by malicious or faulty workloads. Finally, maintaining a robust patch management process and subscribing to Linux kernel security advisories will ensure timely awareness and response to similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-03-27T16:40:15.738Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9821c4522896dcbdd8e7

Added to database: 5/21/2025, 9:08:49 AM

Last enriched: 6/28/2025, 1:55:16 AM

Last updated: 8/9/2025, 10:25:17 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats