First published: Thu Nov 07 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: bnep: fix wild-memory-access in proto_unregister There's issue as follows: KASAN: maybe wild-memory-access in range [0xdead...108-0xdead...10f] CPU: 3 UID: 0 PID: 2805 Comm: rmmod Tainted: G W RIP: 0010:proto_unregister+0xee/0x400 Call Trace: <TASK> __do_sys_delete_module+0x318/0x580 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f As bnep_init() ignore bnep_sock_init()'s return value, and bnep_sock_init() will cleanup all resource. Then when remove bnep module will call bnep_sock_cleanup() to cleanup sock's resource. To solve above issue just return bnep_sock_init()'s return value in bnep_exit().
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2324332 is high due to the potential for wild memory access vulnerabilities.
To fix REDHAT-BUG-2324332, update to the latest version of the Linux kernel provided by your distribution.
The systems affected by REDHAT-BUG-2324332 include any running vulnerable versions of the Linux kernel with Bluetooth functionality.
REDHAT-BUG-2324332 addresses a vulnerability related to wild memory access in the Bluetooth BNEP protocol.
If you cannot update due to REDHAT-BUG-2324332, consider implementing additional security measures such as disabling Bluetooth until a patch can be applied.