Skip to main content

CVE-2023-53142: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2023-53142cvecve-2023-53142
Published: Fri May 02 2025 (05/02/2025, 15:56:12 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ice: copy last block omitted in ice_get_module_eeprom() ice_get_module_eeprom() is broken since commit e9c9692c8a81 ("ice: Reimplement module reads used by ethtool") In this refactor, ice_get_module_eeprom() reads the eeprom in blocks of size 8. But the condition that should protect the buffer overflow ignores the last block. The last block always contains zeros. Bug uncovered by ethtool upstream commit 9538f384b535 ("netlink: eeprom: Defer page requests to individual parsers") After this commit, ethtool reads a block with length = 1; to read the SFF-8024 identifier value. unpatched driver: $ ethtool -m enp65s0f0np0 offset 0x90 length 8 Offset Values ------ ------ 0x0090: 00 00 00 00 00 00 00 00 $ ethtool -m enp65s0f0np0 offset 0x90 length 12 Offset Values ------ ------ 0x0090: 00 00 01 a0 4d 65 6c 6c 00 00 00 00 $ $ ethtool -m enp65s0f0np0 Offset Values ------ ------ 0x0000: 11 06 06 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 01 08 00 0x0070: 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 patched driver: $ ethtool -m enp65s0f0np0 offset 0x90 length 8 Offset Values ------ ------ 0x0090: 00 00 01 a0 4d 65 6c 6c $ ethtool -m enp65s0f0np0 offset 0x90 length 12 Offset Values ------ ------ 0x0090: 00 00 01 a0 4d 65 6c 6c 61 6e 6f 78 $ ethtool -m enp65s0f0np0 Identifier : 0x11 (QSFP28) Extended identifier : 0x00 Extended identifier description : 1.5W max. Power consumption Extended identifier description : No CDR in TX, No CDR in RX Extended identifier description : High Power Class (> 3.5 W) not enabled Connector : 0x23 (No separable connector) Transceiver codes : 0x88 0x00 0x00 0x00 0x00 0x00 0x00 0x00 Transceiver type : 40G Ethernet: 40G Base-CR4 Transceiver type : 25G Ethernet: 25G Base-CR CA-N Encoding : 0x05 (64B/66B) BR, Nominal : 25500Mbps Rate identifier : 0x00 Length (SMF,km) : 0km Length (OM3 50um) : 0m Length (OM2 50um) : 0m Length (OM1 62.5um) : 0m Length (Copper or Active cable) : 1m Transmitter technology : 0xa0 (Copper cable unequalized) Attenuation at 2.5GHz : 4db Attenuation at 5.0GHz : 5db Attenuation at 7.0GHz : 7db Attenuation at 12.9GHz : 10db ........ ....

AI-Powered Analysis

AILast updated: 07/01/2025, 04:57:02 UTC

Technical Analysis

CVE-2023-53142 is a vulnerability identified in the Linux kernel's 'ice' network driver, specifically within the function ice_get_module_eeprom(). This function is responsible for reading the EEPROM data from network interface modules, which is used by the ethtool utility to query hardware information. The vulnerability stems from a refactor commit (e9c9692c8a81) that changed the way EEPROM data is read in blocks of size 8 bytes. However, the condition intended to prevent buffer overflow fails to account for the last block, which can lead to an out-of-bounds read or write. The last block always contains zeros, but the improper boundary check allows ethtool to request a read length that exceeds the buffer size, potentially causing memory corruption. This bug was uncovered after an upstream ethtool commit (9538f384b535) changed the way EEPROM pages are requested, including requests with length = 1 to read specific identifiers. The vulnerability does not appear to have known exploits in the wild yet. The patch corrects the boundary check and properly handles the last block, preventing buffer overflow and ensuring accurate EEPROM data retrieval. The vulnerability affects Linux kernel versions containing the problematic commit and impacts systems using the ice driver, which is commonly used for Intel Ethernet devices, particularly 40G and 25G Ethernet adapters. The vulnerability is technical and low-level, involving kernel driver memory handling and hardware interaction, and could potentially be exploited to cause denial of service or kernel memory corruption if an attacker can trigger ethtool queries with crafted parameters.

Potential Impact

For European organizations, the impact of CVE-2023-53142 depends largely on the deployment of affected Intel Ethernet hardware using the ice driver within their Linux-based infrastructure. Such hardware is prevalent in data centers, telecom equipment, and enterprise servers. Successful exploitation could lead to kernel memory corruption, potentially causing system instability, crashes, or denial of service. While there is no evidence of remote exploitation or privilege escalation, local attackers or malicious insiders with the ability to execute ethtool commands could trigger the vulnerability. This could disrupt critical network services or degrade system reliability. In sectors such as finance, telecommunications, and critical infrastructure—where Linux servers with high-speed Intel network cards are common—this vulnerability could impact availability and operational continuity. However, the lack of known exploits and the requirement for local access or specific conditions reduce the immediate risk. Still, unpatched systems remain vulnerable to potential future exploitation, which could be leveraged in targeted attacks or combined with other vulnerabilities for privilege escalation or persistent denial of service.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions that include the patch for CVE-2023-53142. Specifically, ensure that the ice driver is updated to the fixed version that correctly handles EEPROM block reads. Network administrators should audit systems using Intel Ethernet adapters with the ice driver and verify kernel versions. Restrict access to ethtool and similar utilities to trusted administrators only, as exploitation requires the ability to invoke ethtool with crafted parameters. Implement strict access controls and monitoring on systems with affected hardware to detect unusual ethtool usage or kernel errors. For critical systems, consider deploying kernel live patching solutions to apply fixes without downtime. Additionally, maintain robust system integrity monitoring to detect any anomalies caused by memory corruption. In environments where patching is delayed, consider isolating affected systems or limiting user privileges to reduce the attack surface. Finally, stay informed on vendor advisories and Linux kernel updates to promptly apply future security patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-05-02T15:51:43.562Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9830c4522896dcbe70f4

Added to database: 5/21/2025, 9:09:04 AM

Last enriched: 7/1/2025, 4:57:02 AM

Last updated: 8/15/2025, 12:44:19 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats