Skip to main content

CVE-2023-52475: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2023-52475cvecve-2023-52475
Published: Thu Feb 29 2024 (02/29/2024, 05:43:08 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: Input: powermate - fix use-after-free in powermate_config_complete syzbot has found a use-after-free bug [1] in the powermate driver. This happens when the device is disconnected, which leads to a memory free from the powermate_device struct. When an asynchronous control message completes after the kfree and its callback is invoked, the lock does not exist anymore and hence the bug. Use usb_kill_urb() on pm->config to cancel any in-progress requests upon device disconnection. [1] https://syzkaller.appspot.com/bug?extid=0434ac83f907a1dbdd1e

AI-Powered Analysis

AILast updated: 07/01/2025, 09:26:54 UTC

Technical Analysis

CVE-2023-52475 is a use-after-free vulnerability identified in the Linux kernel's powermate driver, which handles input devices such as the Griffin PowerMate USB controller. The flaw occurs when the device is disconnected: the powermate_device structure is freed (kfree), but asynchronous control messages that were in progress may still complete and invoke callbacks referencing the now-freed memory. Specifically, the lock associated with the device no longer exists when the callback executes, leading to a use-after-free condition. This can cause undefined behavior including kernel crashes, memory corruption, or potentially privilege escalation if exploited. The root cause is the failure to cancel in-progress USB requests upon device disconnection. The fix involves calling usb_kill_urb() on the device's config URB to ensure all pending requests are terminated before freeing the device structure, preventing callbacks from accessing freed memory. This vulnerability was discovered via syzbot, an automated kernel fuzzing tool, and affects certain Linux kernel versions identified by specific commit hashes. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of this vulnerability depends on the deployment of Linux systems using the powermate driver, typically in environments where Griffin PowerMate or similar USB input devices are used. Exploitation could lead to kernel crashes causing denial of service, or potentially allow local attackers to execute arbitrary code with kernel privileges if they can trigger the use-after-free condition. This could compromise system confidentiality, integrity, and availability. Organizations relying on Linux servers, workstations, or embedded devices with this driver are at risk, especially if untrusted users have physical or logical access to connect/disconnect USB devices. Critical infrastructure, research institutions, and enterprises with Linux-based systems in Europe could face operational disruptions or data breaches if exploited. However, the lack of known exploits and the requirement for device interaction limit immediate widespread risk.

Mitigation Recommendations

European organizations should promptly update their Linux kernels to versions where this vulnerability is patched. If immediate patching is not feasible, administrators should restrict physical and logical access to USB ports to trusted users only, minimizing the risk of malicious device disconnection or connection. Implement USB device whitelisting and disable unused USB ports where possible. Monitoring kernel logs for unusual powermate driver errors or crashes can help detect exploitation attempts. For environments using custom or embedded Linux builds, ensure the powermate driver is updated or disabled if not required. Additionally, security teams should review USB device management policies and consider endpoint protection solutions that monitor kernel-level anomalies. Regular vulnerability scanning and kernel fuzzing can help identify similar issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-20T12:30:33.298Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9831c4522896dcbe7a8c

Added to database: 5/21/2025, 9:09:05 AM

Last enriched: 7/1/2025, 9:26:54 AM

Last updated: 7/30/2025, 10:42:57 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats