ghsa-pwc2-x7qx-wmwx
Vulnerability from github
Published
2024-03-03 00:30
Modified
2024-11-01 18:31
Details

In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_codec: Fix leaking content of local_codecs

The following memory leak can be observed when the controller supports codecs which are stored in local_codecs list but the elements are never freed:

unreferenced object 0xffff88800221d840 (size 32): comm "kworker/u3:0", pid 36, jiffies 4294898739 (age 127.060s) hex dump (first 32 bytes): f8 d3 02 03 80 88 ff ff 80 d8 21 02 80 88 ff ff ..........!..... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] __kmalloc+0x47/0x120 [] hci_codec_list_add.isra.0+0x2d/0x160 [] hci_read_codec_capabilities+0x183/0x270 [] hci_read_supported_codecs+0x1bb/0x2d0 [] hci_read_local_codecs_sync+0x3e/0x60 [] hci_dev_open_sync+0x943/0x11e0 [] hci_power_on+0x10d/0x3f0 [] process_one_work+0x404/0x800 [] worker_thread+0x374/0x670 [] kthread+0x188/0x1c0 [] ret_from_fork+0x2b/0x50 [] ret_from_fork_asm+0x1a/0x30

Show details on source website


{
  "affected": [],
  "aliases": [
    "CVE-2023-52518"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-770"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2024-03-02T22:15:47Z",
    "severity": "MODERATE"
  },
  "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_codec: Fix leaking content of local_codecs\n\nThe following memory leak can be observed when the controller supports\ncodecs which are stored in local_codecs list but the elements are never\nfreed:\n\nunreferenced object 0xffff88800221d840 (size 32):\n  comm \"kworker/u3:0\", pid 36, jiffies 4294898739 (age 127.060s)\n  hex dump (first 32 bytes):\n    f8 d3 02 03 80 88 ff ff 80 d8 21 02 80 88 ff ff  ..........!.....\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n  backtrace:\n    [\u003cffffffffb324f557\u003e] __kmalloc+0x47/0x120\n    [\u003cffffffffb39ef37d\u003e] hci_codec_list_add.isra.0+0x2d/0x160\n    [\u003cffffffffb39ef643\u003e] hci_read_codec_capabilities+0x183/0x270\n    [\u003cffffffffb39ef9ab\u003e] hci_read_supported_codecs+0x1bb/0x2d0\n    [\u003cffffffffb39f162e\u003e] hci_read_local_codecs_sync+0x3e/0x60\n    [\u003cffffffffb39ff1b3\u003e] hci_dev_open_sync+0x943/0x11e0\n    [\u003cffffffffb396d55d\u003e] hci_power_on+0x10d/0x3f0\n    [\u003cffffffffb30c99b4\u003e] process_one_work+0x404/0x800\n    [\u003cffffffffb30ca134\u003e] worker_thread+0x374/0x670\n    [\u003cffffffffb30d9108\u003e] kthread+0x188/0x1c0\n    [\u003cffffffffb304db6b\u003e] ret_from_fork+0x2b/0x50\n    [\u003cffffffffb300206a\u003e] ret_from_fork_asm+0x1a/0x30",
  "id": "GHSA-pwc2-x7qx-wmwx",
  "modified": "2024-11-01T18:31:24Z",
  "published": "2024-03-03T00:30:31Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52518"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/626535077ba9dc110787540d1fe24881094c15a1"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/b938790e70540bf4f2e653dcd74b232494d06c8f"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/eea5a8f0c3b7c884d2351e75fbdd0a3d7def5ae1"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "type": "CVSS_V3"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.