CVE-2023-52985: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: arm64: dts: imx8mm-verdin: Do not power down eth-phy Currently if suspending using either freeze or memory state, the fec driver tries to power down the phy which leads to crash of the kernel and non-responsible kernel with the following call trace: [ 24.839889 ] Call trace: [ 24.839892 ] phy_error+0x18/0x60 [ 24.839898 ] kszphy_handle_interrupt+0x6c/0x80 [ 24.839903 ] phy_interrupt+0x20/0x2c [ 24.839909 ] irq_thread_fn+0x30/0xa0 [ 24.839919 ] irq_thread+0x178/0x2c0 [ 24.839925 ] kthread+0x154/0x160 [ 24.839932 ] ret_from_fork+0x10/0x20 Since there is currently no functionality in the phy subsystem to power down phys let's just disable the feature of powering-down the ethernet phy.
AI Analysis
Technical Summary
CVE-2023-52985 is a vulnerability identified in the Linux kernel specifically affecting the ARM64 architecture with the imx8mm-verdin device tree source (DTS) configuration. The issue arises when the system enters suspend states such as freeze or memory suspend. During these suspend operations, the Fast Ethernet Controller (fec) driver attempts to power down the Ethernet physical layer device (phy). However, the phy subsystem currently lacks the functionality to properly power down the phy, which leads to a kernel crash and results in a non-responsive system. The kernel crash is evidenced by a call trace involving phy_error, kszphy_handle_interrupt, phy_interrupt, irq_thread_fn, irq_thread, kthread, and ret_from_fork functions. The root cause is the fec driver's attempt to power down the phy during suspend, which is unsupported and causes instability. The resolution implemented disables the feature of powering down the Ethernet phy to prevent the kernel crash. This fix ensures that during suspend states, the phy remains powered, avoiding the problematic state transition that causes the kernel panic. The vulnerability affects Linux kernel versions identified by the commit hash 6a57f224f7346c8d23596f2ef1ce360669926f54 and is currently published without a CVSS score or known exploits in the wild. The vulnerability is specific to the ARM64 platform with the imx8mm-verdin DTS configuration, which is used in certain embedded systems and IoT devices based on NXP's i.MX8M Mini processors.
Potential Impact
For European organizations, the impact of CVE-2023-52985 is primarily on embedded systems and devices running Linux on ARM64 platforms with the imx8mm-verdin configuration. These devices are often used in industrial automation, IoT deployments, and specialized networking equipment. A kernel crash during suspend operations can lead to system instability, unexpected reboots, or denial of service conditions. This can disrupt critical infrastructure operations, manufacturing processes, or network availability. Although this vulnerability does not directly lead to remote code execution or data breach, the resulting denial of service can impact operational continuity and reliability. Organizations relying on affected hardware for edge computing, industrial control systems, or network appliances may experience outages or degraded performance. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to crashes triggered by suspend operations, which could be exploited by local attackers or malicious insiders to disrupt services. The impact is more pronounced in environments where devices frequently enter suspend states to conserve power or where uptime is critical.
Mitigation Recommendations
To mitigate CVE-2023-52985, European organizations should: 1) Apply the latest Linux kernel patches that disable the Ethernet phy power-down feature for the affected imx8mm-verdin DTS configuration. This prevents the kernel crash by avoiding unsupported phy power state transitions. 2) Identify and inventory all devices running the affected Linux kernel versions on ARM64 platforms with the imx8mm-verdin configuration, prioritizing those used in critical infrastructure or production environments. 3) Where patching is not immediately possible, consider disabling suspend states (freeze or memory suspend) on affected devices to prevent triggering the vulnerability. 4) Monitor system logs for kernel crash traces related to phy_error or fec driver issues to detect attempts to exploit or trigger the vulnerability. 5) Engage with hardware and software vendors to confirm the availability of updated firmware or kernel versions that address this issue. 6) Implement robust backup and recovery procedures to minimize downtime in case of kernel crashes. 7) For new deployments, prefer hardware and kernel versions that have this vulnerability resolved to avoid exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Finland
CVE-2023-52985: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: arm64: dts: imx8mm-verdin: Do not power down eth-phy Currently if suspending using either freeze or memory state, the fec driver tries to power down the phy which leads to crash of the kernel and non-responsible kernel with the following call trace: [ 24.839889 ] Call trace: [ 24.839892 ] phy_error+0x18/0x60 [ 24.839898 ] kszphy_handle_interrupt+0x6c/0x80 [ 24.839903 ] phy_interrupt+0x20/0x2c [ 24.839909 ] irq_thread_fn+0x30/0xa0 [ 24.839919 ] irq_thread+0x178/0x2c0 [ 24.839925 ] kthread+0x154/0x160 [ 24.839932 ] ret_from_fork+0x10/0x20 Since there is currently no functionality in the phy subsystem to power down phys let's just disable the feature of powering-down the ethernet phy.
AI-Powered Analysis
Technical Analysis
CVE-2023-52985 is a vulnerability identified in the Linux kernel specifically affecting the ARM64 architecture with the imx8mm-verdin device tree source (DTS) configuration. The issue arises when the system enters suspend states such as freeze or memory suspend. During these suspend operations, the Fast Ethernet Controller (fec) driver attempts to power down the Ethernet physical layer device (phy). However, the phy subsystem currently lacks the functionality to properly power down the phy, which leads to a kernel crash and results in a non-responsive system. The kernel crash is evidenced by a call trace involving phy_error, kszphy_handle_interrupt, phy_interrupt, irq_thread_fn, irq_thread, kthread, and ret_from_fork functions. The root cause is the fec driver's attempt to power down the phy during suspend, which is unsupported and causes instability. The resolution implemented disables the feature of powering down the Ethernet phy to prevent the kernel crash. This fix ensures that during suspend states, the phy remains powered, avoiding the problematic state transition that causes the kernel panic. The vulnerability affects Linux kernel versions identified by the commit hash 6a57f224f7346c8d23596f2ef1ce360669926f54 and is currently published without a CVSS score or known exploits in the wild. The vulnerability is specific to the ARM64 platform with the imx8mm-verdin DTS configuration, which is used in certain embedded systems and IoT devices based on NXP's i.MX8M Mini processors.
Potential Impact
For European organizations, the impact of CVE-2023-52985 is primarily on embedded systems and devices running Linux on ARM64 platforms with the imx8mm-verdin configuration. These devices are often used in industrial automation, IoT deployments, and specialized networking equipment. A kernel crash during suspend operations can lead to system instability, unexpected reboots, or denial of service conditions. This can disrupt critical infrastructure operations, manufacturing processes, or network availability. Although this vulnerability does not directly lead to remote code execution or data breach, the resulting denial of service can impact operational continuity and reliability. Organizations relying on affected hardware for edge computing, industrial control systems, or network appliances may experience outages or degraded performance. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to crashes triggered by suspend operations, which could be exploited by local attackers or malicious insiders to disrupt services. The impact is more pronounced in environments where devices frequently enter suspend states to conserve power or where uptime is critical.
Mitigation Recommendations
To mitigate CVE-2023-52985, European organizations should: 1) Apply the latest Linux kernel patches that disable the Ethernet phy power-down feature for the affected imx8mm-verdin DTS configuration. This prevents the kernel crash by avoiding unsupported phy power state transitions. 2) Identify and inventory all devices running the affected Linux kernel versions on ARM64 platforms with the imx8mm-verdin configuration, prioritizing those used in critical infrastructure or production environments. 3) Where patching is not immediately possible, consider disabling suspend states (freeze or memory suspend) on affected devices to prevent triggering the vulnerability. 4) Monitor system logs for kernel crash traces related to phy_error or fec driver issues to detect attempts to exploit or trigger the vulnerability. 5) Engage with hardware and software vendors to confirm the availability of updated firmware or kernel versions that address this issue. 6) Implement robust backup and recovery procedures to minimize downtime in case of kernel crashes. 7) For new deployments, prefer hardware and kernel versions that have this vulnerability resolved to avoid exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-03-27T16:40:15.741Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982fc4522896dcbe6c43
Added to database: 5/21/2025, 9:09:03 AM
Last enriched: 7/1/2025, 2:54:38 AM
Last updated: 8/16/2025, 6:47:36 AM
Views: 18
Related Threats
CVE-2025-9107: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9106: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9105: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9104: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9102: Improper Export of Android Application Components in 1&1 Mail & Media mail.com App
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.