Skip to main content

CVE-2023-52670: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2023-52670cvecve-2023-52670
Published: Fri May 17 2024 (05/17/2024, 14:02:01 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: rpmsg: virtio: Free driver_override when rpmsg_remove() Free driver_override when rpmsg_remove(), otherwise the following memory leak will occur: unreferenced object 0xffff0000d55d7080 (size 128): comm "kworker/u8:2", pid 56, jiffies 4294893188 (age 214.272s) hex dump (first 32 bytes): 72 70 6d 73 67 5f 6e 73 00 00 00 00 00 00 00 00 rpmsg_ns........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000009c94c9c1>] __kmem_cache_alloc_node+0x1f8/0x320 [<000000002300d89b>] __kmalloc_node_track_caller+0x44/0x70 [<00000000228a60c3>] kstrndup+0x4c/0x90 [<0000000077158695>] driver_set_override+0xd0/0x164 [<000000003e9c4ea5>] rpmsg_register_device_override+0x98/0x170 [<000000001c0c89a8>] rpmsg_ns_register_device+0x24/0x30 [<000000008bbf8fa2>] rpmsg_probe+0x2e0/0x3ec [<00000000e65a68df>] virtio_dev_probe+0x1c0/0x280 [<00000000443331cc>] really_probe+0xbc/0x2dc [<00000000391064b1>] __driver_probe_device+0x78/0xe0 [<00000000a41c9a5b>] driver_probe_device+0xd8/0x160 [<000000009c3bd5df>] __device_attach_driver+0xb8/0x140 [<0000000043cd7614>] bus_for_each_drv+0x7c/0xd4 [<000000003b929a36>] __device_attach+0x9c/0x19c [<00000000a94e0ba8>] device_initial_probe+0x14/0x20 [<000000003c999637>] bus_probe_device+0xa0/0xac

AI-Powered Analysis

AILast updated: 07/01/2025, 05:40:15 UTC

Technical Analysis

CVE-2023-52670 is a vulnerability identified in the Linux kernel specifically related to the rpmsg (remote processor messaging) subsystem using virtio transport. The issue arises from improper handling of the driver_override field during the rpmsg_remove() function call. When rpmsg_remove() is invoked, the driver_override pointer is not freed correctly, leading to a memory leak. This leak manifests as unreferenced kernel objects accumulating over time, which can degrade system performance or stability. The vulnerability is rooted in a use-after-free or improper resource management scenario, classified under CWE-401 (Improper Release of Memory Before Removing Last Reference). The technical details include a backtrace showing kernel functions involved, such as __kmem_cache_alloc_node, __kmalloc_node_track_caller, kstrndup, driver_set_override, and rpmsg_register_device_override, indicating the memory allocation and driver override registration processes are implicated. The vulnerability was patched by ensuring the driver_override is freed during rpmsg_remove(), preventing the memory leak. The CVSS v3.1 score is 6.6 (medium severity), with vector AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, indicating the attack vector is physical (local), low attack complexity, no privileges required, user interaction required, unchanged scope, and high impact on confidentiality, integrity, and availability. No known exploits are reported in the wild as of publication. The affected versions are specific Linux kernel commits identified by hash, implying this affects certain kernel builds before the patch date (May 17, 2024).

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily in environments where Linux kernels with the vulnerable rpmsg subsystem are deployed, especially in embedded systems, industrial control systems, or specialized hardware using remote processor messaging via virtio. The memory leak can lead to resource exhaustion, causing system slowdowns, crashes, or denial of service, impacting availability. The high confidentiality and integrity impact ratings suggest that exploitation could potentially allow attackers to manipulate kernel memory or escalate privileges indirectly, though the requirement for physical access and user interaction limits remote exploitation. Organizations relying on Linux-based infrastructure in sectors such as manufacturing, telecommunications, automotive, or critical infrastructure could face operational disruptions if the vulnerability is exploited. The absence of known exploits reduces immediate threat but does not eliminate risk, especially in targeted attacks or insider threat scenarios.

Mitigation Recommendations

Mitigation requires applying the official Linux kernel patches that address the driver_override freeing in rpmsg_remove(). Organizations should: 1) Identify all systems running affected Linux kernel versions, particularly those using rpmsg and virtio subsystems. 2) Prioritize patching embedded devices, industrial controllers, and specialized hardware that may not receive automatic updates. 3) Implement strict physical access controls to limit attacker proximity, as the attack vector requires physical presence. 4) Monitor kernel logs and system metrics for signs of memory leaks or unusual kworker activity that could indicate exploitation attempts. 5) Employ kernel integrity monitoring tools to detect unauthorized kernel modifications. 6) For environments where immediate patching is not feasible, consider disabling or restricting rpmsg usage if possible. 7) Maintain updated inventories of Linux kernel versions and ensure timely application of security updates from trusted sources.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-03-07T14:49:46.885Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9830c4522896dcbe7260

Added to database: 5/21/2025, 9:09:04 AM

Last enriched: 7/1/2025, 5:40:15 AM

Last updated: 8/2/2025, 1:02:59 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats