Skip to main content

CVE-2023-52785: Vulnerability in Linux Linux

High
VulnerabilityCVE-2023-52785cvecve-2023-52785
Published: Tue May 21 2024 (05/21/2024, 15:31:03 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Fix racing issue between ufshcd_mcq_abort() and ISR If command timeout happens and cq complete IRQ is raised at the same time, ufshcd_mcq_abort clears lprb->cmd and a NULL pointer deref happens in the ISR. Error log: ufshcd_abort: Device abort task at tag 18 Unable to handle kernel NULL pointer dereference at virtual address 0000000000000108 pc : [0xffffffe27ef867ac] scsi_dma_unmap+0xc/0x44 lr : [0xffffffe27f1b898c] ufshcd_release_scsi_cmd+0x24/0x114

AI-Powered Analysis

AILast updated: 07/01/2025, 06:57:43 UTC

Technical Analysis

CVE-2023-52785 is a vulnerability identified in the Linux kernel's SCSI subsystem, specifically within the UFS (Universal Flash Storage) core driver. The flaw arises from a race condition between the ufshcd_mcq_abort() function and the interrupt service routine (ISR) handling completion queue (CQ) interrupts. When a command timeout occurs simultaneously with a CQ completion IRQ, the ufshcd_mcq_abort function clears the lprb->cmd pointer, which is subsequently dereferenced by the ISR, leading to a NULL pointer dereference. This results in a kernel panic or crash, as indicated by the error logs referencing an inability to handle a NULL pointer dereference at a low virtual address. The vulnerability is rooted in improper synchronization between abort handling and interrupt processing in the UFS host controller driver, which can cause system instability or denial of service. The affected Linux kernel versions include those identified by the commit hash f1304d4420777f82a1d844c606db3d9eca841765. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The issue was publicly disclosed on May 21, 2024, and has been addressed in recent kernel updates, though patch links were not provided in the source data.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected UFS driver versions, especially those utilizing UFS storage devices common in embedded systems, mobile devices, or specialized hardware. The impact is mainly a denial of service (DoS) through kernel crashes, which can disrupt critical services, cause data loss, or require system reboots. In environments where high availability is crucial, such as financial institutions, healthcare providers, or industrial control systems, this could lead to operational downtime and potential compliance issues. Although the vulnerability does not appear to allow privilege escalation or remote code execution, the resulting instability could be exploited indirectly by attackers to cause service interruptions. Given the lack of known exploits, the immediate threat level is moderate, but the potential for exploitation exists if attackers develop techniques to trigger the race condition reliably.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched. Since the issue involves a race condition in the UFS driver, applying the latest stable kernel releases or vendor-provided security patches is critical. For systems where kernel updates are not immediately feasible, organizations should consider disabling UFS storage support if possible or isolating affected devices to reduce exposure. Monitoring kernel logs for signs of ufshcd_abort messages or kernel NULL pointer dereferences can help detect attempted exploitation or system instability. Additionally, implementing robust system monitoring and automated reboot procedures can mitigate downtime caused by unexpected crashes. Organizations should also engage with their hardware vendors to confirm UFS firmware compatibility with patched kernels and ensure coordinated updates. Finally, maintaining strict access controls and limiting user privileges can reduce the risk of malicious triggering of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-21T15:19:24.241Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9830c4522896dcbe7558

Added to database: 5/21/2025, 9:09:04 AM

Last enriched: 7/1/2025, 6:57:43 AM

Last updated: 7/26/2025, 7:05:04 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats