Skip to main content

CVE-2023-52518: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2023-52518cvecve-2023-52518
Published: Sat Mar 02 2024 (03/02/2024, 21:54:47 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_codec: Fix leaking content of local_codecs The following memory leak can be observed when the controller supports codecs which are stored in local_codecs list but the elements are never freed: unreferenced object 0xffff88800221d840 (size 32): comm "kworker/u3:0", pid 36, jiffies 4294898739 (age 127.060s) hex dump (first 32 bytes): f8 d3 02 03 80 88 ff ff 80 d8 21 02 80 88 ff ff ..........!..... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffffb324f557>] __kmalloc+0x47/0x120 [<ffffffffb39ef37d>] hci_codec_list_add.isra.0+0x2d/0x160 [<ffffffffb39ef643>] hci_read_codec_capabilities+0x183/0x270 [<ffffffffb39ef9ab>] hci_read_supported_codecs+0x1bb/0x2d0 [<ffffffffb39f162e>] hci_read_local_codecs_sync+0x3e/0x60 [<ffffffffb39ff1b3>] hci_dev_open_sync+0x943/0x11e0 [<ffffffffb396d55d>] hci_power_on+0x10d/0x3f0 [<ffffffffb30c99b4>] process_one_work+0x404/0x800 [<ffffffffb30ca134>] worker_thread+0x374/0x670 [<ffffffffb30d9108>] kthread+0x188/0x1c0 [<ffffffffb304db6b>] ret_from_fork+0x2b/0x50 [<ffffffffb300206a>] ret_from_fork_asm+0x1a/0x30

AI-Powered Analysis

AILast updated: 07/01/2025, 10:10:44 UTC

Technical Analysis

CVE-2023-52518 is a medium-severity vulnerability in the Linux kernel's Bluetooth subsystem, specifically within the hci_codec component responsible for managing Bluetooth codec information. The flaw involves a memory leak where codec objects stored in the local_codecs list are not properly freed when no longer needed. This results in unreferenced objects accumulating in kernel memory, as demonstrated by the provided kernel backtrace and memory dump. The vulnerability arises because the kernel allocates memory for codec structures during Bluetooth controller initialization or codec capability queries but fails to release this memory, leading to resource exhaustion over time. The issue is classified under CWE-770 (Allocation of Resources Without Limits or Throttling). The CVSS 3.1 score is 5.5 (medium), with an attack vector of local access (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality or integrity impact (C:N/I:N), but causing availability impact (A:H) due to potential denial of service from memory exhaustion. The vulnerability affects specific Linux kernel versions identified by commit hashes and was published on March 2, 2024. No known exploits are currently reported in the wild. The flaw is mitigated by patches that properly free the allocated codec objects, preventing memory leaks during Bluetooth device operations.

Potential Impact

For European organizations, this vulnerability primarily poses a risk of denial of service (DoS) on Linux systems utilizing Bluetooth functionality, especially those with Bluetooth controllers supporting multiple codecs. Systems affected could experience gradual memory exhaustion leading to kernel instability or crashes, impacting availability of services relying on Bluetooth connectivity. This is particularly relevant for enterprises deploying Linux servers, embedded devices, or IoT infrastructure with Bluetooth capabilities. While confidentiality and integrity are not directly compromised, operational disruptions could affect critical business processes, especially in sectors like manufacturing, healthcare, and transportation where Bluetooth-enabled devices are common. The local attack vector and requirement for low privileges limit remote exploitation but insider threats or compromised local users could trigger the issue. Given the widespread use of Linux across European industries and public sector, unpatched systems may face increased downtime or require emergency maintenance, impacting operational continuity and increasing support costs.

Mitigation Recommendations

European organizations should promptly apply the official Linux kernel patches that address CVE-2023-52518 to ensure proper memory management in the Bluetooth hci_codec subsystem. Systems should be updated to the latest stable kernel releases containing the fix. For environments where immediate patching is challenging, administrators can consider disabling Bluetooth functionality on critical systems if not required, to eliminate exposure. Monitoring kernel logs for unusual memory allocation patterns or Bluetooth-related errors can help detect potential exploitation attempts or memory leaks. Implementing strict access controls to limit local user privileges reduces risk of exploitation. Additionally, organizations should incorporate this vulnerability into their vulnerability management and patching workflows, prioritizing Linux systems with Bluetooth hardware. Testing patches in staging environments before deployment is recommended to avoid regressions. Finally, maintaining up-to-date asset inventories to identify affected Linux kernel versions and Bluetooth-enabled devices will streamline remediation efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-20T12:30:33.317Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9831c4522896dcbe7c21

Added to database: 5/21/2025, 9:09:05 AM

Last enriched: 7/1/2025, 10:10:44 AM

Last updated: 7/30/2025, 3:53:52 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats