First published: Thu May 23 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: msft: fix slab-use-after-free in msft_do_close() Tying the msft->data lifetime to hdev by freeing it in hci_release_dev() to fix the following case: [use] msft_do_close() msft = hdev->msft_data; if (!msft) ...(1) <- passed. return; mutex_lock(&msft->filter_lock); ...(4) <- used after freed. [free] msft_unregister() msft = hdev->msft_data; hdev->msft_data = NULL; ...(2) kfree(msft); ...(3) <- msft is freed. ================================================================== BUG: KASAN: slab-use-after-free in __mutex_lock_common kernel/locking/mutex.c:587 [inline] BUG: KASAN: slab-use-after-free in __mutex_lock+0x8f/0xc30 kernel/locking/mutex.c:752 Read of size 8 at addr ffff888106cbbca8 by task kworker/u5:2/309
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.12<6.1.91 | |
Linux Kernel | >=6.2<6.6.31 | |
Linux Kernel | >=6.7<6.8.10 | |
Linux Kernel | =6.9-rc1 | |
Linux Kernel | =6.9-rc2 | |
Linux Kernel | =6.9-rc3 | |
Linux Kernel | =6.9-rc4 | |
Linux Kernel | =6.9-rc5 | |
Linux Kernel | =6.9-rc6 | |
Linux Kernel | =6.9-rc7 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-36012 is categorized as a medium severity vulnerability in the Linux kernel.
To fix CVE-2024-36012, update to a patched version of the Linux kernel, specifically to versions 5.10.223-1, 5.10.226-1, 6.1.123-1, 6.1.128-1, or 6.12.12-1.
CVE-2024-36012 affects Linux kernel versions between 5.12 and 6.1.91, as well as several specific versions up to 6.9-rc7.
CVE-2024-36012 is caused by a slab-use-after-free vulnerability in the Bluetooth functionality within the Linux kernel.
Currently, there is no documented workaround for CVE-2024-36012; updating the kernel is the recommended approach.