Cyber Posture

CVE-2023-52973

High

Published: 27 March 2025

Published
27 March 2025
Modified
01 April 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0004 13.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2023-52973 is a use-after-free (UAF) vulnerability in the Linux kernel's vc_screen subsystem, located in the vcs_read() function of drivers/tty/vt/vc_screen.c. The flaw occurs because the struct vc_data pointer is loaded after a console_unlock() call, allowing vc_deallocate() to free the structure before it is accessed in vcs_size(), resulting in a UAF. This issue was detected by the Syzkaller fuzzer, with KASAN reporting a read of size 4 at a freed address during vcs_size() execution.

A local attacker with low privileges (AV:L/AC:L/PR:L/UI:N) can exploit this vulnerability, as indicated by its CVSS v3.1 base score of 7.8 (C:H/I:H/A:H/S:U). Exploitation involves triggering vcs_read() on a virtual console device, such as through reads after console operations that lead to deallocation, potentially enabling arbitrary code execution, data corruption, or denial of service via the UAF.

Kernel stable patches address the issue by moving the load of the struct vc_data pointer to the top of the while loop in vcs_read() to ensure it occurs before console_unlock(). Affected users should apply commits such as 226fae124b2dac217ea5436060d623ff3385bc34, 55515d7d8743b71b80bfe68e89eb9d92630626ab, 6332f52f44b9776568bf3c0b714ddfb0bb175e78, 8506f16aae9daf354e3732bcfd447e2a97f023df, and af79ea9a2443016f64d8fd8d72020cc874f0e066 from the kernel stable repository.

Details

CWE(s)
CWE-416

Affected Products

linux
linux kernel
6.2 · 2.6.38 — 4.14.329 · 4.15 — 4.19.273 · 4.20 — 5.4.232

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The kernel use-after-free in vcs_read() directly enables local privilege escalation via arbitrary code execution or system compromise by a low-privileged attacker.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References