CVE-2023-53658:Linux kernel vulnerability in bcm-qspi driver causing potential null pointer dereference on device removal.

splash
Back

Description Preview

A vulnerability has been identified in the Linux kernel's bcm-qspi driver. The issue occurs when neither "hif_mspi" nor "mspi" resources are available. In such cases, the driver would exit early during probe but still return success. This not only results in the driver failing to perform its intended function but also leads to a null pointer access during device removal. The problem arises because platform_get_drvdata() returns NULL, which is then dereferenced when attempting to unregister the SPI master.

Overview

The vulnerability affects the bcm-qspi driver in the Linux kernel. It stems from improper error handling when specific hardware resources are unavailable. This can lead to a null pointer dereference, potentially causing system instability or crashes. The issue is particularly concerning as it manifests during device removal, which could complicate system maintenance or hardware changes. While not directly exploitable for arbitrary code execution, this vulnerability represents a significant reliability and stability risk for affected systems.

Remediation

The fix involves modifying the driver to use devm_ioremap_resource() unconditionally. This function can handle a NULL resource and will return a valid ERR_PTR() in such cases. This change ensures proper error handling and prevents the null pointer dereference. System administrators and developers using affected Linux kernel versions should update to a patched version as soon as it becomes available. In the interim, caution should be exercised when working with systems that might use the bcm-qspi driver, especially during hardware removal or system shutdown procedures.

References

[1] Linux kernel stable branch commit 217b6ea8cf7b819477bca597a6ae2d43d38ba283 [2] Linux kernel stable branch commit 22ae32d80ef590d12a2364e4621f90f7c58445c7 [3] Linux kernel stable branch commit 32b9c8f7892c19f7f5c9fed5fb410b9fd5990bb6 [4] Linux kernel stable branch commit 398e6a015877d44327f754aeb48ff3354945c78c [5] Linux kernel stable branch commit 7c1f23ad34fcdace50275a6aa1e1969b41c6233f [6] Linux kernel stable branch commit a91c34357afcfaa5307e254f22a8452550a07b34 [7] Linux kernel stable branch commit d20db3c58a7f9361e370a7850ceb60dbdf62eea3 [8] Linux kernel stable branch commit d3dcdb43c872a3b967345144151a2c9bb9124c9b

Industry ExposureMost to least
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.

  1. Manufacturing: Medium
    Manufacturing
  2. Finance and Insurance: Low
    Finance and Insurance
  3. Professional, Scientific, & Technical Services: Low
    Professional, Scientific, & Technical Services
  4. Retail Trade: Low
    Retail Trade
  5. Arts, Entertainment & Recreation: Low
    Arts, Entertainment & Recreation
  6. Educational Services: Low
    Educational Services
  7. Public Administration: Low
    Public Administration
  8. Health Care & Social Assistance: Low
    Health Care & Social Assistance
  9. Management of Companies & Enterprises: Low
    Management of Companies & Enterprises
  10. Other Services (except Public Administration): Low
    Other Services (except Public Administration)
  11. Transportation & Warehousing: Low
    Transportation & Warehousing
  12. Accommodation & Food Services: Low
    Accommodation & Food Services
  13. Administrative, Support, Waste Management & Remediation Services: Low
    Administrative, Support, Waste Management & Remediation Services
  14. Agriculture, Forestry Fishing & Hunting: Low
    Agriculture, Forestry Fishing & Hunting
  15. Construction: Low
    Construction
  16. Information: Low
    Information
  17. Mining: Low
    Mining
  18. Real Estate Rental & Leasing: Low
    Real Estate Rental & Leasing
  19. Utilities: Low
    Utilities
  20. Wholesale Trade: Low
    Wholesale Trade

Focus on What Matters

  1. See Everything.
  2. Identify True Risk.
  3. Proactively Mitigate Threats.

Let's talk!

background