CVE-2023-35826
📋 TL;DR
A use-after-free vulnerability in the Linux kernel's cedrus video decoder driver allows local attackers to potentially escalate privileges or cause denial of service. This affects Linux systems using the sunxi/cedrus driver for Allwinner SoC hardware acceleration. Only systems with this specific driver loaded are vulnerable.
💻 Affected Systems
- Linux kernel
📦 What is this software?
H300s by Netapp
H410c by Netapp
H410s by Netapp
H500s by Netapp
H700s by Netapp
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Local privilege escalation to root, allowing complete system compromise and potential kernel panic/crash.
Likely Case
Local denial of service through kernel panic or system instability, requiring physical/hard reboot.
If Mitigated
Limited impact if driver not loaded or system not using Allwinner hardware acceleration.
🎯 Exploit Status
Requires local access and knowledge of driver interaction. No public exploits known as of analysis.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Linux kernel 6.3.2 and later
Vendor Advisory: https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2
Restart Required: Yes
Instructions:
1. Update kernel to 6.3.2 or later via distribution package manager. 2. For custom kernels: apply commit 50d0a7aea4809cef87979d4669911276aa23b71f. 3. Reboot system to load patched kernel.
🔧 Temporary Workarounds
Disable cedrus module
linuxPrevent loading of vulnerable driver module
echo 'blacklist sunxi_cedrus' >> /etc/modprobe.d/blacklist-cedrus.conf
rmmod sunxi_cedrus
Kernel module restriction
linuxRestrict module loading to prevent driver activation
echo 'install sunxi_cedrus /bin/false' >> /etc/modprobe.d/disable-cedrus.conf
🧯 If You Can't Patch
- Restrict local user access to systems with cedrus driver loaded
- Implement strict SELinux/AppArmor policies to limit driver interaction
🔍 How to Verify
Check if Vulnerable:
Check kernel version: uname -r and verify < 6.3.2. Check if cedrus module loaded: lsmod | grep -i cedrus
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version >= 6.3.2 with uname -r. Check commit contains fix: grep -r '50d0a7aea4809cef87979d4669911276aa23b71f' /usr/src/linux
📡 Detection & Monitoring
Log Indicators:
- Kernel oops messages in /var/log/kern.log
- System crashes/reboots without clear cause
- Failed module loads for sunxi_cedrus
Network Indicators:
- None - local exploit only
SIEM Query:
source="kern.log" AND ("Oops" OR "general protection fault" OR "use-after-free") AND cedrus
🔗 References
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=50d0a7aea4809cef87979d4669911276aa23b71f
- https://lore.kernel.org/all/a4dafa22-3ee3-dbe1-fd50-fee07883ce1a%40xs4all.nl/
- https://lore.kernel.org/linux-arm-kernel/20230308032333.1893394-1-zyytlz.wz%40163.com/T/
- https://security.netapp.com/advisory/ntap-20230803-0002/
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=50d0a7aea4809cef87979d4669911276aa23b71f
- https://lore.kernel.org/all/a4dafa22-3ee3-dbe1-fd50-fee07883ce1a%40xs4all.nl/
- https://lore.kernel.org/linux-arm-kernel/20230308032333.1893394-1-zyytlz.wz%40163.com/T/
- https://security.netapp.com/advisory/ntap-20230803-0002/