First published: Tue Apr 11 2023(Updated: )
A use-after-free flaw was found in btsdio_remove in drivers\bluetooth\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race condition, and lead to a UAF problem on the hdev devices. This bug has been submitted to upstream and got fixed in [1] and [2] [1] <a href="https://lore.kernel.org/all/167883542095.4543.7797236411801708072.git-patchwork-notify@kernel.org/">https://lore.kernel.org/all/167883542095.4543.7797236411801708072.git-patchwork-notify@kernel.org/</a> [2] <a href="https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088">https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088</a>
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.3 | 6.3 |
IBM Security Verify Governance, Identity Manager software component | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager virtual appliance component | <=ISVG 10.0.2 | |
Linux Kernel | >=2.6.24<4.14.312 | |
Linux Kernel | >=4.15<4.19.280 | |
Linux Kernel | >=4.20<5.4.240 | |
Linux Kernel | >=5.5<5.10.177 | |
Linux Kernel | >=5.11<5.15.105 | |
Linux Kernel | >=5.16<6.1.22 | |
Linux Kernel | >=6.2<6.2.9 | |
netapp h300s | ||
netapp h410c | ||
netapp h410s | ||
netapp h500s | ||
netapp h700s | ||
Debian GNU/Linux | =10.0 | |
Debian GNU/Linux | =12.0 | |
netapp baseboard management controller h300s | ||
netapp baseboard management controller h410c | ||
netapp baseboard management controller h410s | ||
netapp baseboard management controller h500s | ||
netapp baseboard management controller h700s | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-1989 is categorized as high due to its use-after-free vulnerability that can lead to a race condition.
To fix CVE-2023-1989, update to the latest kernel version, specifically versions 6.3 or higher, or the recommended updates from your operating system vendor.
CVE-2023-1989 affects Linux Kernel versions between 2.6.24 and 6.3, as well as certain IBM Security Verify Governance products.
The CVE-2023-1989 vulnerability is caused by a use-after-free flaw in the btsdio_remove function that can occur when there is an unfinished job with hdev devices.
If you cannot apply the patch for CVE-2023-1989 immediately, be sure to limit access to affected systems and monitor for signs of exploitation.