Cyber Posture

CVE-2023-52980

High

Published: 27 March 2025

Published
27 March 2025
Modified
28 October 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0003 8.8th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2023-52980 is an integer overflow vulnerability in the Linux kernel's block layer, specifically within the ublk (user block) driver. The issue arises when configuring a multiqueue ublk device with a large queue depth exceeding 2728, up to the maximum of 4096 defined by UBLK_MAX_QUEUE_DEPTH in ublk_cmd.h. The queue_size calculation, sizeof(struct ublk_queue) + depth * sizeof(struct ublk_io), exceeds 65535 and overflows, likely due to an underlying 16-bit type limit. This results in ublk_get_queue() accessing an incorrect pointer position, leading to out-of-bounds memory access classified under CWE-787.

A local attacker with low privileges (PR:L) can exploit this vulnerability with low attack complexity and no user interaction required (AV:L/AC:L/UI:N). Successful exploitation grants high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), with a CVSS v3.1 base score of 7.8 in an unchanged scope (S:U). The attacker could potentially read or write arbitrary memory, execute arbitrary code, or cause system crashes by triggering the overflow during ublk device queue depth assignment.

Kernel patches addressing this issue are available in stable branches, as documented in the referenced commits. The fix extends the queue_size field in struct ublk_device from its original type to unsigned int, preventing the overflow and ensuring correct queue allocation. Security practitioners should update affected Linux kernels with these patches to mitigate the vulnerability.

Details

CWE(s)
CWE-787

Affected Products

linux
linux kernel
6.2 · 6.0 — 6.1.11

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Local kernel integer overflow in ublk driver enables out-of-bounds memory access for arbitrary code execution or privilege escalation from low-privileged user context.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References