CVE-2023-3141

7.1 HIGH

📋 TL;DR

A use-after-free vulnerability in the Linux kernel's r592 memory stick host driver allows local attackers to crash the system during device disconnect, potentially leaking kernel memory information. This affects Linux systems with the r592 driver loaded, typically those using memory stick devices. Attackers need local access to exploit this vulnerability.

💻 Affected Systems

Products:
  • Linux Kernel
Versions: Linux kernel versions before 6.3.4
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if r592 driver is loaded (typically when using memory stick devices). Many systems may not have this driver active by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and potential kernel memory information disclosure, which could aid further exploitation.

🟠

Likely Case

System crash or instability when disconnecting memory stick devices, requiring reboot to restore functionality.

🟢

If Mitigated

Minor system disruption requiring reboot if exploited by authenticated user.

🌐 Internet-Facing: LOW - Requires local access to exploit, not remotely exploitable.
🏢 Internal Only: MEDIUM - Local attackers with user access could crash systems, but requires specific hardware/driver configuration.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to trigger device disconnect events. No public exploit code identified in references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel 6.3.4 and later

Vendor Advisory: https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4

Restart Required: Yes

Instructions:

1. Update Linux kernel to version 6.3.4 or later. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel package. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable r592 driver

linux

Prevent loading of vulnerable r592 memory stick host driver

echo 'blacklist r592' >> /etc/modprobe.d/blacklist.conf
rmmod r592

Restrict device access

linux

Limit access to memory stick devices to trusted users only

chmod 600 /dev/memstick*
setfacl -m u:trusteduser:rw /dev/memstick*

🧯 If You Can't Patch

  • Implement strict access controls to prevent untrusted users from accessing memory stick devices
  • Monitor system logs for kernel panic events related to memory stick disconnections

🔍 How to Verify

Check if Vulnerable:

Check kernel version: uname -r and compare to affected versions (<6.3.4). Check if r592 module is loaded: lsmod | grep r592

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is 6.3.4 or later: uname -r. Confirm r592 module functions normally with memory stick devices.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages in /var/log/kern.log or dmesg
  • OOM (Out of Memory) killer activity
  • System crash/reboot events

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("panic" OR "Oops" OR "BUG") AND ("r592" OR "memstick")

🔗 References

📤 Share & Export