Description
In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: purge error queues in socket destructors

When TX timestamping is enabled via SO_TIMESTAMPING, SKBs may be queued
into sk_error_queue and will stay there until consumed. If userspace never
gets to read the timestamps, or if the controller is removed unexpectedly,
these SKBs will leak.

Fix by adding skb_queue_purge() calls for sk_error_queue in affected
bluetooth destructors. RFCOMM does not currently use sk_error_queue.
Published: 2026-03-25
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Potential kernel memory exhaustion and DoS via unpurged socket error queues
Action: Apply Patch
AI Analysis

Impact

The defect resides in the Linux Bluetooth subsystem, where transmit timestamping enables sk_buff instances to be queued into sk_error_queue. The kernel fails to clear this queue during socket cleanup, so the queued sk_buffs persist until the user processes the timestamps or until the Bluetooth controller is disconnected. Because the items remain in memory, repeated creation and destruction of Bluetooth sockets can consume kernel memory, potentially exhausting the system and resulting in a denial of service. This weakness is a classic resource‑leak scenario (CWE‑772).

Affected Systems

The issue affects the Linux kernel’s Bluetooth implementation. All distributions running a kernel build that contains the buggy Bluetooth socket destructors and that enable SO_TIMESTAMPING are potentially impacted. The specific kernel versions are not listed in the advisory, so administrators should check whether their kernel series includes this change as part of recent updates.

Risk and Exploitability

The packaged CVSS score is 5.5, reflecting a moderate impact and requiring operators or local users to invoke Bluetooth socket operations. The EPSS score of less than 1% suggests that exploitation is unlikely at present, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector involves a user or application that repeatedly opens and closes Bluetooth sockets with timestamping enabled, eventually exhausting kernel memory. Because the flaw is a kernel resource leak rather than an immediate privilege‑escalation flaw, it is generally mitigated by applying the kernel patch before a DoS occurs.

Generated by OpenCVE AI on March 26, 2026 at 14:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a Linux kernel update that includes the skb_queue_purge fix for Bluetooth socket destructors
  • If an immediate kernel update is not available, consider disabling SO_TIMESTAMPING in applications that use Bluetooth sockets to reduce the accumulation of error queue entries
  • Restart the machine to clear any stale sk_error_queue entries while a patch is pending

Generated by OpenCVE AI on March 26, 2026 at 14:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-399

Thu, 26 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-772
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-399

Wed, 25 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: Bluetooth: purge error queues in socket destructors When TX timestamping is enabled via SO_TIMESTAMPING, SKBs may be queued into sk_error_queue and will stay there until consumed. If userspace never gets to read the timestamps, or if the controller is removed unexpectedly, these SKBs will leak. Fix by adding skb_queue_purge() calls for sk_error_queue in affected bluetooth destructors. RFCOMM does not currently use sk_error_queue.
Title Bluetooth: purge error queues in socket destructors
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-13T06:03:54.248Z

Reserved: 2026-01-13T15:37:45.993Z

Link: CVE-2026-23299

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-25T11:16:25.487

Modified: 2026-03-25T15:41:33.977

Link: CVE-2026-23299

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-25T00:00:00Z

Links: CVE-2026-23299 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:50:07Z

Weaknesses