First published: Tue Apr 11 2023(Updated: )
A use-after-free flaw was found in btsdio_remove in drivers\bluetooth\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race condition, and lead to a UAF problem on the hdev devices. This bug has been submitted to upstream and got fixed in [1] and [2] [1] <a href="https://lore.kernel.org/all/167883542095.4543.7797236411801708072.git-patchwork-notify@kernel.org/">https://lore.kernel.org/all/167883542095.4543.7797236411801708072.git-patchwork-notify@kernel.org/</a> [2] <a href="https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088">https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088</a>
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.3 | 6.3 |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
Linux Kernel | >=2.6.24<4.14.312 | |
Linux Kernel | >=4.15<4.19.280 | |
Linux Kernel | >=4.20<5.4.240 | |
Linux Kernel | >=5.5<5.10.177 | |
Linux Kernel | >=5.11<5.15.105 | |
Linux Kernel | >=5.16<6.1.22 | |
Linux Kernel | >=6.2<6.2.9 | |
NetApp H300S Firmware | ||
NetApp H410C Firmware | ||
NetApp H410S Firmware | ||
NetApp H500e Firmware | ||
NetApp H700S | ||
Debian Linux | =10.0 | |
Debian Linux | =12.0 | |
NetApp Baseboard Management Controller H300S | ||
NetApp Baseboard Management Controller H410C Firmware | ||
NetApp Baseboard Management Controller H410S | ||
NetApp Baseboard Management Controller H500S | ||
NetApp Baseboard Management Controller H700S | ||
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 |
https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-1989 is categorized as high due to its use-after-free vulnerability that can lead to a race condition.
To fix CVE-2023-1989, update to the latest kernel version, specifically versions 6.3 or higher, or the recommended updates from your operating system vendor.
CVE-2023-1989 affects Linux Kernel versions between 2.6.24 and 6.3, as well as certain IBM Security Verify Governance products.
The CVE-2023-1989 vulnerability is caused by a use-after-free flaw in the btsdio_remove function that can occur when there is an unfinished job with hdev devices.
If you cannot apply the patch for CVE-2023-1989 immediately, be sure to limit access to affected systems and monitor for signs of exploitation.