CVE-2023-52670: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: rpmsg: virtio: Free driver_override when rpmsg_remove() Free driver_override when rpmsg_remove(), otherwise the following memory leak will occur: unreferenced object 0xffff0000d55d7080 (size 128): comm "kworker/u8:2", pid 56, jiffies 4294893188 (age 214.272s) hex dump (first 32 bytes): 72 70 6d 73 67 5f 6e 73 00 00 00 00 00 00 00 00 rpmsg_ns........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000009c94c9c1>] __kmem_cache_alloc_node+0x1f8/0x320 [<000000002300d89b>] __kmalloc_node_track_caller+0x44/0x70 [<00000000228a60c3>] kstrndup+0x4c/0x90 [<0000000077158695>] driver_set_override+0xd0/0x164 [<000000003e9c4ea5>] rpmsg_register_device_override+0x98/0x170 [<000000001c0c89a8>] rpmsg_ns_register_device+0x24/0x30 [<000000008bbf8fa2>] rpmsg_probe+0x2e0/0x3ec [<00000000e65a68df>] virtio_dev_probe+0x1c0/0x280 [<00000000443331cc>] really_probe+0xbc/0x2dc [<00000000391064b1>] __driver_probe_device+0x78/0xe0 [<00000000a41c9a5b>] driver_probe_device+0xd8/0x160 [<000000009c3bd5df>] __device_attach_driver+0xb8/0x140 [<0000000043cd7614>] bus_for_each_drv+0x7c/0xd4 [<000000003b929a36>] __device_attach+0x9c/0x19c [<00000000a94e0ba8>] device_initial_probe+0x14/0x20 [<000000003c999637>] bus_probe_device+0xa0/0xac
AI Analysis
Technical Summary
CVE-2023-52670 is a vulnerability identified in the Linux kernel specifically related to the rpmsg (remote processor messaging) subsystem using virtio transport. The issue arises from improper handling of the driver_override field during the rpmsg_remove() function call. When rpmsg_remove() is invoked, the driver_override pointer is not freed correctly, leading to a memory leak. This leak manifests as unreferenced kernel objects accumulating over time, which can degrade system performance or stability. The vulnerability is rooted in a use-after-free or improper resource management scenario, classified under CWE-401 (Improper Release of Memory Before Removing Last Reference). The technical details include a backtrace showing kernel functions involved, such as __kmem_cache_alloc_node, __kmalloc_node_track_caller, kstrndup, driver_set_override, and rpmsg_register_device_override, indicating the memory allocation and driver override registration processes are implicated. The vulnerability was patched by ensuring the driver_override is freed during rpmsg_remove(), preventing the memory leak. The CVSS v3.1 score is 6.6 (medium severity), with vector AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, indicating the attack vector is physical (local), low attack complexity, no privileges required, user interaction required, unchanged scope, and high impact on confidentiality, integrity, and availability. No known exploits are reported in the wild as of publication. The affected versions are specific Linux kernel commits identified by hash, implying this affects certain kernel builds before the patch date (May 17, 2024).
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily in environments where Linux kernels with the vulnerable rpmsg subsystem are deployed, especially in embedded systems, industrial control systems, or specialized hardware using remote processor messaging via virtio. The memory leak can lead to resource exhaustion, causing system slowdowns, crashes, or denial of service, impacting availability. The high confidentiality and integrity impact ratings suggest that exploitation could potentially allow attackers to manipulate kernel memory or escalate privileges indirectly, though the requirement for physical access and user interaction limits remote exploitation. Organizations relying on Linux-based infrastructure in sectors such as manufacturing, telecommunications, automotive, or critical infrastructure could face operational disruptions if the vulnerability is exploited. The absence of known exploits reduces immediate threat but does not eliminate risk, especially in targeted attacks or insider threat scenarios.
Mitigation Recommendations
Mitigation requires applying the official Linux kernel patches that address the driver_override freeing in rpmsg_remove(). Organizations should: 1) Identify all systems running affected Linux kernel versions, particularly those using rpmsg and virtio subsystems. 2) Prioritize patching embedded devices, industrial controllers, and specialized hardware that may not receive automatic updates. 3) Implement strict physical access controls to limit attacker proximity, as the attack vector requires physical presence. 4) Monitor kernel logs and system metrics for signs of memory leaks or unusual kworker activity that could indicate exploitation attempts. 5) Employ kernel integrity monitoring tools to detect unauthorized kernel modifications. 6) For environments where immediate patching is not feasible, consider disabling or restricting rpmsg usage if possible. 7) Maintain updated inventories of Linux kernel versions and ensure timely application of security updates from trusted sources.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Sweden, Finland, Poland
CVE-2023-52670: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: rpmsg: virtio: Free driver_override when rpmsg_remove() Free driver_override when rpmsg_remove(), otherwise the following memory leak will occur: unreferenced object 0xffff0000d55d7080 (size 128): comm "kworker/u8:2", pid 56, jiffies 4294893188 (age 214.272s) hex dump (first 32 bytes): 72 70 6d 73 67 5f 6e 73 00 00 00 00 00 00 00 00 rpmsg_ns........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000009c94c9c1>] __kmem_cache_alloc_node+0x1f8/0x320 [<000000002300d89b>] __kmalloc_node_track_caller+0x44/0x70 [<00000000228a60c3>] kstrndup+0x4c/0x90 [<0000000077158695>] driver_set_override+0xd0/0x164 [<000000003e9c4ea5>] rpmsg_register_device_override+0x98/0x170 [<000000001c0c89a8>] rpmsg_ns_register_device+0x24/0x30 [<000000008bbf8fa2>] rpmsg_probe+0x2e0/0x3ec [<00000000e65a68df>] virtio_dev_probe+0x1c0/0x280 [<00000000443331cc>] really_probe+0xbc/0x2dc [<00000000391064b1>] __driver_probe_device+0x78/0xe0 [<00000000a41c9a5b>] driver_probe_device+0xd8/0x160 [<000000009c3bd5df>] __device_attach_driver+0xb8/0x140 [<0000000043cd7614>] bus_for_each_drv+0x7c/0xd4 [<000000003b929a36>] __device_attach+0x9c/0x19c [<00000000a94e0ba8>] device_initial_probe+0x14/0x20 [<000000003c999637>] bus_probe_device+0xa0/0xac
AI-Powered Analysis
Technical Analysis
CVE-2023-52670 is a vulnerability identified in the Linux kernel specifically related to the rpmsg (remote processor messaging) subsystem using virtio transport. The issue arises from improper handling of the driver_override field during the rpmsg_remove() function call. When rpmsg_remove() is invoked, the driver_override pointer is not freed correctly, leading to a memory leak. This leak manifests as unreferenced kernel objects accumulating over time, which can degrade system performance or stability. The vulnerability is rooted in a use-after-free or improper resource management scenario, classified under CWE-401 (Improper Release of Memory Before Removing Last Reference). The technical details include a backtrace showing kernel functions involved, such as __kmem_cache_alloc_node, __kmalloc_node_track_caller, kstrndup, driver_set_override, and rpmsg_register_device_override, indicating the memory allocation and driver override registration processes are implicated. The vulnerability was patched by ensuring the driver_override is freed during rpmsg_remove(), preventing the memory leak. The CVSS v3.1 score is 6.6 (medium severity), with vector AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, indicating the attack vector is physical (local), low attack complexity, no privileges required, user interaction required, unchanged scope, and high impact on confidentiality, integrity, and availability. No known exploits are reported in the wild as of publication. The affected versions are specific Linux kernel commits identified by hash, implying this affects certain kernel builds before the patch date (May 17, 2024).
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily in environments where Linux kernels with the vulnerable rpmsg subsystem are deployed, especially in embedded systems, industrial control systems, or specialized hardware using remote processor messaging via virtio. The memory leak can lead to resource exhaustion, causing system slowdowns, crashes, or denial of service, impacting availability. The high confidentiality and integrity impact ratings suggest that exploitation could potentially allow attackers to manipulate kernel memory or escalate privileges indirectly, though the requirement for physical access and user interaction limits remote exploitation. Organizations relying on Linux-based infrastructure in sectors such as manufacturing, telecommunications, automotive, or critical infrastructure could face operational disruptions if the vulnerability is exploited. The absence of known exploits reduces immediate threat but does not eliminate risk, especially in targeted attacks or insider threat scenarios.
Mitigation Recommendations
Mitigation requires applying the official Linux kernel patches that address the driver_override freeing in rpmsg_remove(). Organizations should: 1) Identify all systems running affected Linux kernel versions, particularly those using rpmsg and virtio subsystems. 2) Prioritize patching embedded devices, industrial controllers, and specialized hardware that may not receive automatic updates. 3) Implement strict physical access controls to limit attacker proximity, as the attack vector requires physical presence. 4) Monitor kernel logs and system metrics for signs of memory leaks or unusual kworker activity that could indicate exploitation attempts. 5) Employ kernel integrity monitoring tools to detect unauthorized kernel modifications. 6) For environments where immediate patching is not feasible, consider disabling or restricting rpmsg usage if possible. 7) Maintain updated inventories of Linux kernel versions and ensure timely application of security updates from trusted sources.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-03-07T14:49:46.885Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9830c4522896dcbe7260
Added to database: 5/21/2025, 9:09:04 AM
Last enriched: 7/1/2025, 5:40:15 AM
Last updated: 8/2/2025, 1:02:59 PM
Views: 11
Related Threats
CVE-2025-8974: Hard-coded Credentials in linlinjava litemall
MediumCVE-2025-8973: SQL Injection in SourceCodester Cashier Queuing System
MediumCVE-2025-21110: CWE-250: Execution with Unnecessary Privileges in Dell Data Lakehouse
MediumCVE-2025-8972: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-51986: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.