We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-36012

Bluetooth: msft: fix slab-use-after-free in msft_do_close()



AssignerLinux
Reserved2024-05-17
Published2024-05-23
Updated2024-08-02

Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: msft: fix slab-use-after-free in msft_do_close() Tying the msft->data lifetime to hdev by freeing it in hci_release_dev() to fix the following case: [use] msft_do_close() msft = hdev->msft_data; if (!msft) ...(1) <- passed. return; mutex_lock(&msft->filter_lock); ...(4) <- used after freed. [free] msft_unregister() msft = hdev->msft_data; hdev->msft_data = NULL; ...(2) kfree(msft); ...(3) <- msft is freed. ================================================================== BUG: KASAN: slab-use-after-free in __mutex_lock_common kernel/locking/mutex.c:587 [inline] BUG: KASAN: slab-use-after-free in __mutex_lock+0x8f/0xc30 kernel/locking/mutex.c:752 Read of size 8 at addr ffff888106cbbca8 by task kworker/u5:2/309

Product status

Default status
unaffected

bf6a4e30ffbd before e3880b531b68
affected

bf6a4e30ffbd before a85a60e62355
affected

bf6a4e30ffbd before 4f1de02de077
affected

bf6a4e30ffbd before 10f9f426ac6e
affected

Default status
affected

5.12
affected

Any version before 5.12
unaffected

6.1.91
unaffected

6.6.31
unaffected

6.8.10
unaffected

6.9
unaffected

References

https://git.kernel.org/stable/c/e3880b531b68f98d3941d83f2f6dd11cf4fd6b76

https://git.kernel.org/stable/c/a85a60e62355e3bf4802dead7938966824b23940

https://git.kernel.org/stable/c/4f1de02de07748da80a8178879bc7a1df37fdf56

https://git.kernel.org/stable/c/10f9f426ac6e752c8d87bf4346930ba347aaabac

cve.org CVE-2024-36012

nvd.nist.gov CVE-2024-36012

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.