U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2023-52830

Change History

CVE Modified by kernel.org 5/22/2024 8:15:09 AM

Action Type Old Value New Value
Changed Description
In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix double free in hci_conn_cleanup

syzbot reports a slab use-after-free in hci_conn_hash_flush [1].
After releasing an object using hci_conn_del_sysfs in the
hci_conn_cleanup function, releasing the same object again
using the hci_dev_put and hci_conn_put functions causes a double free.
Here's a simplified flow:

hci_conn_del_sysfs:
  hci_dev_put
    put_device
      kobject_put
        kref_put
          kobject_release
            kobject_cleanup
              kfree_const
                kfree(name)

hci_dev_put:
  ...
    kfree(name)

hci_conn_put:
  put_device
    ...
      kfree(name)

This patch drop the hci_dev_put and hci_conn_put function
call in hci_conn_cleanup function, because the object is
freed in hci_conn_del_sysfs function.

This patch also fixes the refcounting in hci_conn_add_sysfs() and
hci_conn_del_sysfs() to take into account device_add() failures.

This fixes CVE-2023-28464.
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Removed Reference
kernel.org https://git.kernel.org/stable/c/3c4236f1b2a715e878a06599fa8b0cc21f165d28

								
						
Removed Reference
kernel.org https://git.kernel.org/stable/c/53d61daf35b1bbf3ae06e852ee107aa2f05b3776

								
						
Removed Reference
kernel.org https://git.kernel.org/stable/c/56a4fdde95ed98d864611155f6728983e199e198

								
						
Removed Reference
kernel.org https://git.kernel.org/stable/c/5c53afc766e07098429520b7677eaa164b593451

								
						
Removed Reference
kernel.org https://git.kernel.org/stable/c/87624b1f9b781549e69f92db7ede012a21cec275

								
						
Removed Reference
kernel.org https://git.kernel.org/stable/c/a85fb91e3d728bdfc80833167e8162cce8bc7004

								
						
Removed Reference
kernel.org https://git.kernel.org/stable/c/ba7088769800d9892a7e4f35c3137a5b3e65410b

								
						
Removed Reference
kernel.org https://git.kernel.org/stable/c/fc666d1b47518a18519241cae213de1babd4a4ba

								
						

CVE Rejected by kernel.org 5/22/2024 8:15:09 AM

Action Type Old Value New Value

CVE Translated by kernel.org 5/22/2024 8:15:09 AM

Action Type Old Value New Value
Removed Translation
Title: kernel de Linux
Description: En el kernel de Linux, se resolvió la siguiente vulnerabilidad: Bluetooth: Corrección de doble liberación en hci_conn_cleanup syzbot informa un use after free de slab en hci_conn_hash_flush [1]. Después de liberar un objeto usando hci_conn_del_sysfs en la función hci_conn_cleanup, liberar el mismo objeto nuevamente usando las funciones hci_dev_put y hci_conn_put provoca un double free. Aquí hay un flujo simplificado: hci_conn_del_sysfs: hci_dev_put put_device kobject_put kref_put kobject_release kobject_cleanup kfree_const kfree(name) hci_dev_put: ... kfree(name) hci_conn_put: put_device ... kfree(name) Este parche elimina la llamada a las funciones hci_dev_put y hci_conn_put en hci_con función n_cleanup, porque el objeto se libera en la función hci_conn_del_sysfs. Este parche también corrige el recuento en hci_conn_add_sysfs() y hci_conn_del_sysfs() para tener en cuenta las fallas de device_add(). Esto corrige CVE-2023-28464.