CVE-2023-1079
Linux Kernel vulnerability analysis and mitigation

Overview

A use-after-free vulnerability (CVE-2023-1079) was discovered in the Linux kernel's ASUS HID driver, specifically in the asuskbdbacklight_set function. The vulnerability was discovered by Pietro Borrello and disclosed on March 1, 2023. The flaw affects the Linux kernel's handling of ASUS device removal, particularly when dealing with USB keyboard backlight functionality (OSS Security, Ubuntu Security).

Technical details

The vulnerability occurs when a workstruct may be scheduled by the LED controller while the device is disconnecting, triggering a use-after-free on the struct asuskbdleds *led structure. The issue is similar to the previously known CVE-2023-25012. The fix involves using spinlocks to safely deal with workers by introducing a wrapper asusschedule_work() and several spinlock checks (Kernel Git).

Impact

The vulnerability could allow an attacker with physical access to cause memory corruption with controlled data. This could potentially lead to denial of service (system crash or memory corruption) or possibly allow arbitrary code execution in the kernel context (Ubuntu Security, Debian LTS).

Mitigation and workarounds

The vulnerability has been fixed in the Linux kernel through a patch that implements proper spinlock protection. The fix has been merged into the Linux tree and backported to various distributions. Ubuntu and Debian have released security updates for affected versions (Ubuntu Security, Debian LTS).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management