CVE-2023-33203
Linux Kernel vulnerability analysis and mitigation

Overview

The Linux kernel before version 6.2.9 contains a race condition vulnerability (CVE-2023-33203) in the Qualcomm EMAC Gigabit Ethernet Controller driver (drivers/net/ethernet/qualcomm/emac/emac.c). The vulnerability was discovered by Zheng Wang, Zhuorao Yang, Yang Hu, and Zong Cao, and was publicly disclosed in May 2023. The issue occurs when a physically proximate attacker unplugs an EMAC-based device, potentially leading to a use-after-free condition (NVD, Red Hat Bugzilla).

Technical details

The vulnerability stems from a race condition in the driver's work thread handling. In emacprobe, &adpt->workthread is bound with emacworkthread, which can be triggered by either the timeout handler emactxtimeout or the IRQ handler emacisr. When the driver is removed (calling emacremove for cleanup), there may be an unfinished work thread, leading to a use-after-free condition where the netdev structure is accessed after being freed. The vulnerability has been assigned a CVSS v3.1 base score of 6.4 (Medium) with vector AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H (NVD, SUSE Bugzilla).

Impact

If successfully exploited, this vulnerability could allow a physically proximate attacker to cause a denial of service (system crash) or potentially execute arbitrary code. The attack requires physical access to unplug an EMAC-based device at a specific time to trigger the race condition (Ubuntu Security).

Mitigation and workarounds

The vulnerability has been fixed in Linux kernel version 6.2.9 with commit 6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75. The fix involves finishing the work thread before cleanup in emac_remove and disabling timeout response. Major Linux distributions have released patches for their respective kernel versions (Kernel Commit).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40258HIGH7
  • Linux KernelLinux Kernel
  • kernel-rt-64k-debug-devel-matched
NoNoDec 04, 2025
CVE-2025-40259MEDIUM6.2
  • Linux KernelLinux Kernel
  • kernel-rt-64k
NoNoDec 04, 2025
CVE-2025-40264MEDIUM5.5
  • Linux KernelLinux Kernel
  • kernel-64k-modules-extra
NoNoDec 04, 2025
CVE-2025-40254MEDIUM5.5
  • Linux KernelLinux Kernel
  • kernel-64k-devel-matched
NoNoDec 04, 2025
CVE-2025-40253MEDIUM5.5
  • Linux KernelLinux Kernel
  • kernel-64k-debug-modules-partner
NoNoDec 04, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management