Skip to main content

CVE-2023-52893: Vulnerability in Linux Linux

High
VulnerabilityCVE-2023-52893cvecve-2023-52893
Published: Wed Aug 21 2024 (08/21/2024, 06:10:33 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: gsmi: fix null-deref in gsmi_get_variable We can get EFI variables without fetching the attribute, so we must allow for that in gsmi. commit 859748255b43 ("efi: pstore: Omit efivars caching EFI varstore access layer") added a new get_variable call with attr=NULL, which triggers panic in gsmi.

AI-Powered Analysis

AILast updated: 07/01/2025, 08:13:39 UTC

Technical Analysis

CVE-2023-52893 is a vulnerability identified in the Linux kernel related to the handling of EFI (Extensible Firmware Interface) variables within the gsmi (presumably a component or module interacting with EFI variables). The issue arises from a null pointer dereference in the function gsmi_get_variable. Specifically, a recent kernel commit introduced a new get_variable call that allows fetching EFI variables without specifying attributes (attr=NULL). This change inadvertently triggers a panic in the gsmi component due to the lack of handling for null attributes, leading to a null pointer dereference. The vulnerability is rooted in improper input validation and error handling when EFI variables are accessed without attributes, causing the kernel to crash (panic). This can result in denial of service (DoS) conditions on affected Linux systems. The affected versions are identified by a specific commit hash, indicating that this issue is present in certain recent kernel builds prior to the fix. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The vulnerability does not appear to allow privilege escalation or arbitrary code execution directly but can cause system instability or downtime due to kernel panics triggered by malformed EFI variable requests.

Potential Impact

For European organizations, the impact of CVE-2023-52893 primarily involves potential denial of service on Linux-based systems that interact with EFI variables via the vulnerable gsmi component. This could affect servers, workstations, and embedded devices running affected Linux kernel versions. Critical infrastructure, cloud service providers, and enterprises relying on Linux for their operations may experience unexpected system crashes, leading to service interruptions, loss of availability, and operational disruptions. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact can be significant, especially in environments requiring high uptime such as financial institutions, healthcare providers, and industrial control systems. The lack of known exploits reduces immediate risk, but the vulnerability could be leveraged in targeted attacks or combined with other exploits to increase impact. Organizations using customized or less common Linux kernel builds should verify if their versions are affected. The vulnerability's reliance on EFI variable access means that systems with EFI firmware and Linux kernels incorporating the vulnerable gsmi code path are at risk.

Mitigation Recommendations

To mitigate CVE-2023-52893, European organizations should: 1) Apply the latest Linux kernel patches that address this null pointer dereference vulnerability as soon as they become available from trusted sources or distributions. 2) Audit and monitor systems for kernel panics or crashes related to EFI variable access, especially on systems using EFI firmware and the affected kernel versions. 3) Limit or restrict access to EFI variable interfaces where possible, reducing the attack surface by controlling which processes or users can invoke EFI variable queries. 4) Implement kernel crash monitoring and automated recovery mechanisms to minimize downtime in case of triggered panics. 5) Coordinate with Linux distribution vendors to confirm patch availability and deployment timelines. 6) For environments using custom kernels, ensure that the gsmi_get_variable function is reviewed and patched accordingly. 7) Consider deploying kernel live patching solutions if available to reduce the need for full system reboots during patching. 8) Maintain robust incident response plans to quickly address any denial of service events caused by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-08-21T06:07:11.013Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9831c4522896dcbe784f

Added to database: 5/21/2025, 9:09:05 AM

Last enriched: 7/1/2025, 8:13:39 AM

Last updated: 8/20/2025, 5:14:43 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats