CVE-2023-53003
Published: 27 March 2025
Description
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Security Summary
CVE-2023-53003 is a use-after-free vulnerability (CWE-416) in the Linux kernel's EDAC/qcom driver. The issue arises because memory for llcc_driv_data, allocated by the LLCC driver, is passed as the private driver info (pvt_info) to the EDAC core. During qcom_edac driver release, this memory is freed, but on subsequent probing of the qcom_edac driver, it attempts to use the freed data, triggering the use-after-free condition.
A local attacker with low privileges (PR:L) can exploit this vulnerability with low attack complexity and no user interaction required (AV:L/AC:L/UI:N). Successful exploitation leads to high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), with an overall CVSS v3.1 base score of 7.8 and unchanged scope (S:U). This could potentially allow arbitrary code execution, data corruption, or system crashes on affected systems.
Mitigation is provided through kernel patches available in stable releases, as detailed in the referenced commits. These patches resolve the issue by avoiding the direct passing of llcc_driv_data as pvt_info to the EDAC core, instead referencing it via the platform_data pointer in the qcom_edac driver. Systems should update to a patched kernel version incorporating these fixes, such as those from the linked git.kernel.org stable commits.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Use-after-free in Linux kernel driver enables local low-priv attackers to achieve arbitrary code execution or system compromise, directly mapping to exploitation for privilege escalation.