CVE-2023-52973
Linux Kernel vulnerability analysis and mitigation

Overview

A use-after-free vulnerability was discovered in the Linux kernel's virtual console (vcscreen) implementation. The vulnerability (CVE-2023-52973) was disclosed on March 27, 2025, affecting Linux kernel versions from 2.6.38 up to versions before 6.1.11. The issue occurs in the vcsread() function where the vcdata struct can be freed by vcdeallocate() after a call to console_unlock(), leading to a potential use-after-free condition (NVD).

Technical details

The vulnerability stems from improper handling of struct vcdata pointer in the vcsread() function. After a call to consoleunlock(), the vcdata struct can be freed by vcdeallocate(), but the pointer load occurs too late in the function, leading to a use-after-free when vcssize() is called. The issue was detected by the Syzkaller kernel fuzzer, which reported a KASAN use-after-free error in vcssize at drivers/tty/vt/vcscreen.c:215. The vulnerability has received a CVSS v3.1 base score of 7.8 (HIGH) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (CISA-ADP).

Impact

The vulnerability could allow an attacker with local access to trigger a use-after-free condition, potentially leading to privilege escalation, information disclosure, or system crashes. The high CVSS score indicates that successful exploitation could result in complete compromise of confidentiality, integrity, and availability of the affected system (CISA-ADP).

Mitigation and workarounds

The vulnerability has been patched in the Linux kernel by moving the load of struct vcdata pointer to the top of the while loop in vcsread() to avoid the use-after-free condition. Multiple patches have been released to address this issue across different kernel versions (NVD).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40343MEDIUM6.4
  • Linux KernelLinux Kernel
  • kernel-rt-modules-internal
NoYesDec 09, 2025
CVE-2025-40342MEDIUM6.4
  • Linux KernelLinux Kernel
  • kernel-debug-modules-extra
NoYesDec 09, 2025
CVE-2025-40341MEDIUM5.1
  • Linux KernelLinux Kernel
  • linux-nvidia-tegra
NoYesDec 09, 2025
CVE-2025-40345N/AN/A
  • Linux KernelLinux Kernel
  • kernel-headers
NoYesDec 12, 2025
CVE-2025-40344N/AN/A
  • Linux KernelLinux Kernel
  • linux-azure-6.14
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management