Skip to main content

CVE-2023-52844: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2023-52844cvecve-2023-52844
Published: Tue May 21 2024 (05/21/2024, 15:31:42 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: media: vidtv: psi: Add check for kstrdup Add check for the return value of kstrdup() and return the error if it fails in order to avoid NULL pointer dereference.

AI-Powered Analysis

AILast updated: 07/01/2025, 07:42:12 UTC

Technical Analysis

CVE-2023-52844 is a vulnerability identified in the Linux kernel, specifically within the media subsystem component 'vidtv' in the 'psi' module. The issue arises from the lack of proper error handling for the function kstrdup(), which is used to duplicate strings in kernel space. If kstrdup() fails, it returns a NULL pointer. Prior to the fix, the code did not check for this NULL return value, leading to a potential NULL pointer dereference (CWE-476). This can cause the kernel to crash or become unstable, resulting in a denial of service (DoS) condition. The vulnerability does not affect confidentiality or integrity but impacts availability by causing system crashes. The CVSS v3.1 base score is 6.2 (medium severity), with the vector AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating that the attack requires local access, low complexity, no privileges, and no user interaction. The scope is unchanged, and the impact is limited to availability. No known exploits are reported in the wild yet. The vulnerability affects specific Linux kernel versions identified by commit hashes, and the fix involves adding a check for the return value of kstrdup() and returning an error if it fails to prevent NULL pointer dereference.

Potential Impact

For European organizations, the primary impact of CVE-2023-52844 is the risk of local denial of service on systems running vulnerable Linux kernel versions with the affected media subsystem enabled. This can lead to unexpected system crashes or reboots, disrupting critical services, especially in environments relying on Linux for media processing or embedded systems. While the vulnerability requires local access, it could be exploited by malicious insiders or attackers who have gained limited access to the system. The availability impact may affect servers, workstations, or embedded devices, potentially causing downtime and operational disruption. Organizations in sectors such as telecommunications, media production, and industrial control systems that utilize Linux-based devices with the vidtv psi module could be more affected. However, since the vulnerability does not allow privilege escalation or remote exploitation, the overall risk is moderate but should not be ignored in sensitive or high-availability environments.

Mitigation Recommendations

European organizations should promptly update their Linux kernels to versions that include the patch for CVE-2023-52844. Since the vulnerability is in the kernel media subsystem, organizations should audit their systems to identify if the vidtv psi module is in use or loaded. If the module is not required, disabling or blacklisting it can reduce the attack surface. For systems where local access is tightly controlled, enforcing strict access controls and monitoring for unusual local activity can mitigate exploitation risk. Additionally, implementing kernel crash monitoring and automated recovery mechanisms can minimize downtime in case of exploitation. Organizations should also maintain up-to-date intrusion detection systems and endpoint security solutions to detect potential attempts to exploit local vulnerabilities. Finally, ensure that all Linux-based devices, including embedded and IoT devices, are included in patch management processes to avoid overlooked vulnerable systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-21T15:19:24.254Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9830c4522896dcbe7702

Added to database: 5/21/2025, 9:09:04 AM

Last enriched: 7/1/2025, 7:42:12 AM

Last updated: 7/25/2025, 4:21:42 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats