CVE-2023-52739

Source
https://cve.org/CVERecord?id=CVE-2023-52739
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52739.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-52739
Downstream
Related
Published
2024-05-21T15:23:02.545Z
Modified
2026-03-14T12:16:50.930371Z
Summary
Fix page corruption caused by racy check in __free_pages
Details

In the Linux kernel, the following vulnerability has been resolved:

Fix page corruption caused by racy check in _freepages

When we upgraded our kernel, we started seeing some page corruption like the following consistently:

BUG: Bad page state in process ganesha.nfsd pfn:1304ca page:0000000022261c55 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x1304ca flags: 0x17ffffc0000000() raw: 0017ffffc0000000 ffff8a513ffd4c98 ffffeee24b35ec08 0000000000000000 raw: 0000000000000000 0000000000000001 00000000ffffff7f 0000000000000000 page dumped because: nonzero mapcount CPU: 0 PID: 15567 Comm: ganesha.nfsd Kdump: loaded Tainted: P B O 5.10.158-1.nutanix.20221209.el7.x8664 #1 Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/05/2016 Call Trace: dumpstack+0x74/0x96 badpage.cold+0x63/0x94 checknewpagebad+0x6d/0x80 rmqueue+0x46e/0x970 getpagefrom_freelist+0xcb/0x3f0 ? condresched+0x19/0x40 _allocpagesnodemask+0x164/0x300 allocpagescurrent+0x87/0xf0 skbpagefragrefill+0x84/0x110 ...

Sometimes, it would also show up as corruption in the free list pointer and cause crashes.

After bisecting the issue, we found the issue started from commit e320d3012d25 ("mm/page_alloc.c: fix freeing non-compound pages"):

if (put_page_testzero(page))
    free_the_page(page, order);
else if (!PageHead(page))
    while (order-- > 0)
        free_the_page(page + (1 << order), order);

So the problem is the check PageHead is racy because at this point we already dropped our reference to the page. So even if we came in with compound page, the page can already be freed and PageHead can return false and we will end up freeing all the tail pages causing double free.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52739.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e320d3012d25b1fb5f3df4edb7bd44a1c362ec10
Fixed
0a626e27f984dfbe96bd8e4fd08f20a2ede3ea23
Fixed
3af734f3eac6f70ef8e272a80da40544b9d0f2b5
Fixed
3b4c045a98f53a8890a94bb5846a390c8e39e673
Fixed
462a8e08e0e6287e5ce13187257edbf24213ed03
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
830b103831a924a23af48562c4d274696e75ab4f

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52739.json"