Skip to main content

CVE-2023-52974: Vulnerability in Linux Linux

High
VulnerabilityCVE-2023-52974cvecve-2023-52974
Published: Thu Mar 27 2025 (03/27/2025, 16:43:13 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress If during iscsi_sw_tcp_session_create() iscsi_tcp_r2tpool_alloc() fails, userspace could be accessing the host's ipaddress attr. If we then free the session via iscsi_session_teardown() while userspace is still accessing the session we will hit a use after free bug. Set the tcp_sw_host->session after we have completed session creation and can no longer fail.

AI-Powered Analysis

AILast updated: 07/03/2025, 03:55:03 UTC

Technical Analysis

CVE-2023-52974 is a high-severity use-after-free (UAF) vulnerability identified in the Linux kernel's iSCSI TCP driver component. The vulnerability arises during the iSCSI login process, specifically within the iscsi_sw_tcp_session_create() function. If the iscsi_tcp_r2tpool_alloc() call fails during session creation, userspace processes may still access the host's IP address attribute (shost ipaddress) even after the session has been freed via iscsi_session_teardown(). This creates a use-after-free condition where userspace references freed memory, potentially leading to memory corruption, arbitrary code execution, or system crashes. The root cause is that the tcp_sw_host->session pointer is set prematurely before session creation is fully completed and failure conditions are handled. The fix involves deferring the assignment of tcp_sw_host->session until session creation is guaranteed to succeed, thereby preventing userspace from accessing freed session data. This vulnerability is tracked under CWE-416 (Use After Free) and has a CVSS v3.1 base score of 7.8, indicating high severity. Exploitation requires local privileges (AV:L), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The impact includes high confidentiality, integrity, and availability consequences if exploited. No known exploits are currently reported in the wild. The vulnerability affects Linux kernel versions identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 and likely other versions incorporating this code. The iSCSI TCP driver is used in environments where iSCSI storage networking is employed, typically in enterprise and data center Linux deployments.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily to enterprises and data centers utilizing Linux servers with iSCSI TCP storage networking. Successful exploitation could allow a local attacker or compromised process to execute arbitrary code with kernel privileges, leading to full system compromise, data leakage, or denial of service. This is particularly critical for sectors relying on Linux-based storage infrastructure such as financial institutions, telecommunications, cloud service providers, and government agencies. The high impact on confidentiality, integrity, and availability means sensitive data could be exposed or corrupted, and critical services disrupted. Given the prevalence of Linux in European IT infrastructure and the use of iSCSI for SAN connectivity, the threat could affect a broad range of organizations. However, exploitation requires local access and low privileges, so the initial attack vector would likely be through compromised user accounts or insider threats rather than remote attackers. The absence of known exploits in the wild reduces immediate risk but does not eliminate it, especially as proof-of-concept exploits could emerge.

Mitigation Recommendations

European organizations should prioritize patching Linux kernels to versions that include the fix for CVE-2023-52974 as soon as updates are available. Until patches are applied, organizations should restrict local access to systems running iSCSI TCP drivers, enforce strict user privilege management, and monitor for unusual activity indicative of exploitation attempts. Employing kernel security modules (e.g., SELinux, AppArmor) to limit process capabilities can reduce exploitation risk. Additionally, auditing and hardening iSCSI configurations to minimize unnecessary exposure and disabling unused iSCSI services can reduce the attack surface. Regularly reviewing logs for kernel errors or crashes related to iSCSI sessions may help detect exploitation attempts. For environments where patching is delayed, consider isolating affected systems or migrating critical workloads to patched or unaffected platforms. Finally, maintain up-to-date intrusion detection and prevention systems capable of identifying anomalous kernel or storage subsystem behaviors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-03-27T16:40:15.737Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d982fc4522896dcbe6c18

Added to database: 5/21/2025, 9:09:03 AM

Last enriched: 7/3/2025, 3:55:03 AM

Last updated: 8/11/2025, 1:57:22 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats