CVE-2023-52794: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: thermal: intel: powerclamp: fix mismatch in get function for max_idle KASAN reported this [ 444.853098] BUG: KASAN: global-out-of-bounds in param_get_int+0x77/0x90 [ 444.853111] Read of size 4 at addr ffffffffc16c9220 by task cat/2105 ... [ 444.853442] The buggy address belongs to the variable: [ 444.853443] max_idle+0x0/0xffffffffffffcde0 [intel_powerclamp] There is a mismatch between the param_get_int and the definition of max_idle. Replacing param_get_int with param_get_byte resolves this issue.
AI Analysis
Technical Summary
CVE-2023-52794 is a vulnerability identified in the Linux kernel's Intel powerclamp thermal driver component. The issue arises from a mismatch in the parameter retrieval function used for the 'max_idle' variable. Specifically, the kernel code incorrectly uses 'param_get_int' to access 'max_idle', which is defined as a byte-sized parameter. This discrepancy leads to a global out-of-bounds read detected by Kernel Address Sanitizer (KASAN), indicating that the code reads beyond the allocated memory for 'max_idle'. The bug manifests as a KASAN error with a global out-of-bounds read of 4 bytes at an address corresponding to 'max_idle'. The root cause is the improper use of 'param_get_int' instead of the correct 'param_get_byte' function, which when replaced, resolves the issue. This vulnerability is located within the thermal management subsystem of the Linux kernel, specifically affecting Intel powerclamp, a driver responsible for managing CPU thermal throttling by injecting idle cycles to reduce power consumption and heat generation. The vulnerability was publicly disclosed on May 21, 2024, and no known exploits are reported in the wild at this time. The affected versions correspond to specific Linux kernel commits identified by the hash 'ebf519710218814cf827adbf9111af081344c969'. The vulnerability does not have an assigned CVSS score but is recognized by CISA and Linux security teams. The impact is primarily related to kernel stability and potential information disclosure due to out-of-bounds memory reads, which could be leveraged in more complex attack chains if combined with other vulnerabilities.
Potential Impact
For European organizations, the impact of CVE-2023-52794 depends on their use of Linux systems running affected kernel versions with the Intel powerclamp driver enabled. Since this vulnerability involves a kernel-level out-of-bounds read, it could lead to system instability or crashes, potentially causing denial of service (DoS) conditions. Although no direct privilege escalation or code execution is indicated, out-of-bounds reads can sometimes be exploited to leak sensitive kernel memory, which could aid attackers in bypassing security mechanisms or escalating privileges when chained with other vulnerabilities. Organizations relying on Linux servers, especially those using Intel CPUs with thermal management features enabled, may face risks to system availability and confidentiality. Critical infrastructure, cloud service providers, and enterprises with large Linux deployments in Europe could be affected if patches are not applied promptly. However, the lack of known exploits and the requirement for specific kernel configurations reduce the immediate threat level. Nonetheless, the vulnerability highlights the importance of maintaining updated kernel versions to ensure system reliability and security.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched, specifically ensuring that the Intel powerclamp driver uses 'param_get_byte' for the 'max_idle' parameter. Kernel updates from trusted Linux distributions (e.g., Debian, Ubuntu, Red Hat, SUSE) should be applied as soon as they include this fix. System administrators should audit their Linux systems to verify if the Intel powerclamp driver is active and if the affected kernel versions are in use. For environments where immediate patching is not feasible, disabling the Intel powerclamp driver can serve as a temporary mitigation, though this may impact thermal management and system performance. Additionally, enabling kernel hardening features such as KASAN during development and testing phases can help detect similar issues early. Monitoring system logs for KASAN or kernel warnings related to powerclamp can provide early indicators of exploitation attempts or instability. Finally, organizations should maintain robust incident response plans to address potential kernel-level vulnerabilities and ensure timely communication with Linux distribution vendors for security updates.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2023-52794: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: thermal: intel: powerclamp: fix mismatch in get function for max_idle KASAN reported this [ 444.853098] BUG: KASAN: global-out-of-bounds in param_get_int+0x77/0x90 [ 444.853111] Read of size 4 at addr ffffffffc16c9220 by task cat/2105 ... [ 444.853442] The buggy address belongs to the variable: [ 444.853443] max_idle+0x0/0xffffffffffffcde0 [intel_powerclamp] There is a mismatch between the param_get_int and the definition of max_idle. Replacing param_get_int with param_get_byte resolves this issue.
AI-Powered Analysis
Technical Analysis
CVE-2023-52794 is a vulnerability identified in the Linux kernel's Intel powerclamp thermal driver component. The issue arises from a mismatch in the parameter retrieval function used for the 'max_idle' variable. Specifically, the kernel code incorrectly uses 'param_get_int' to access 'max_idle', which is defined as a byte-sized parameter. This discrepancy leads to a global out-of-bounds read detected by Kernel Address Sanitizer (KASAN), indicating that the code reads beyond the allocated memory for 'max_idle'. The bug manifests as a KASAN error with a global out-of-bounds read of 4 bytes at an address corresponding to 'max_idle'. The root cause is the improper use of 'param_get_int' instead of the correct 'param_get_byte' function, which when replaced, resolves the issue. This vulnerability is located within the thermal management subsystem of the Linux kernel, specifically affecting Intel powerclamp, a driver responsible for managing CPU thermal throttling by injecting idle cycles to reduce power consumption and heat generation. The vulnerability was publicly disclosed on May 21, 2024, and no known exploits are reported in the wild at this time. The affected versions correspond to specific Linux kernel commits identified by the hash 'ebf519710218814cf827adbf9111af081344c969'. The vulnerability does not have an assigned CVSS score but is recognized by CISA and Linux security teams. The impact is primarily related to kernel stability and potential information disclosure due to out-of-bounds memory reads, which could be leveraged in more complex attack chains if combined with other vulnerabilities.
Potential Impact
For European organizations, the impact of CVE-2023-52794 depends on their use of Linux systems running affected kernel versions with the Intel powerclamp driver enabled. Since this vulnerability involves a kernel-level out-of-bounds read, it could lead to system instability or crashes, potentially causing denial of service (DoS) conditions. Although no direct privilege escalation or code execution is indicated, out-of-bounds reads can sometimes be exploited to leak sensitive kernel memory, which could aid attackers in bypassing security mechanisms or escalating privileges when chained with other vulnerabilities. Organizations relying on Linux servers, especially those using Intel CPUs with thermal management features enabled, may face risks to system availability and confidentiality. Critical infrastructure, cloud service providers, and enterprises with large Linux deployments in Europe could be affected if patches are not applied promptly. However, the lack of known exploits and the requirement for specific kernel configurations reduce the immediate threat level. Nonetheless, the vulnerability highlights the importance of maintaining updated kernel versions to ensure system reliability and security.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched, specifically ensuring that the Intel powerclamp driver uses 'param_get_byte' for the 'max_idle' parameter. Kernel updates from trusted Linux distributions (e.g., Debian, Ubuntu, Red Hat, SUSE) should be applied as soon as they include this fix. System administrators should audit their Linux systems to verify if the Intel powerclamp driver is active and if the affected kernel versions are in use. For environments where immediate patching is not feasible, disabling the Intel powerclamp driver can serve as a temporary mitigation, though this may impact thermal management and system performance. Additionally, enabling kernel hardening features such as KASAN during development and testing phases can help detect similar issues early. Monitoring system logs for KASAN or kernel warnings related to powerclamp can provide early indicators of exploitation attempts or instability. Finally, organizations should maintain robust incident response plans to address potential kernel-level vulnerabilities and ensure timely communication with Linux distribution vendors for security updates.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-21T15:19:24.246Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9830c4522896dcbe75a7
Added to database: 5/21/2025, 9:09:04 AM
Last enriched: 7/1/2025, 7:10:32 AM
Last updated: 8/5/2025, 8:32:38 PM
Views: 10
Related Threats
CVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9087: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.