CVE-2023-52750
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2023-52750 affects the Linux kernel's arm64 architecture implementation. The vulnerability is related to incorrect byte-swapping of NOP instructions when compiling for big-endian systems using LLVM's integrated assembler versions prior to 15.0.0. This issue was discovered when the kernel changed how it handles FPSIMD capabilities (Kernel Commit).

Technical details

The vulnerability occurs when LLVM's integrated assembler incorrectly byte-swaps NOP instructions in big-endian mode, resulting in the bytes matching the encoding of FNMADD S21, S30, S0, S0 instruction. This issue became apparent after changes in how the kernel handles FPSIMD capabilities. Prior to the change, FPSIMD was enabled early in boot during _cpusetup() initialization of CPACR_EL1, which masked the issue. After the change, these incorrect instructions would trap during boot before FPSIMD detection (Kernel Commit).

Impact

The vulnerability could result in corruption of user or kernel FPSIMD state when using affected LLVM versions for big-endian ARM64 systems. When triggered, it can cause kernel panics with unhandled exceptions during system boot (Kernel Commit).

Mitigation and workarounds

The fix involves restricting CONFIGCPUBIG_ENDIAN to known good assemblers, specifically either GNU assembler or LLVM's Integrated Assembler (IAS) version 15.0.0 and newer. This was implemented through a Kconfig change that adds version checking for the assembler (Kernel Commit).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management