Use After Free Vulnerability in Linux Kernel Bluetooth Implementation
CVE-2023-53145
Summary
A use after free vulnerability has been identified in the Linux kernel's Bluetooth subsystem, particularly affecting the btsdio implementation. This issue arises from a race condition in the btsdio_remove function, where the associated work, bound to btsdio_work, is not canceled before the cleanup process. If btsdio_remove is executed while the work is still pending, it can lead to referencing a freed memory segment, potentially causing unpredictable behavior and system instability. The vulnerability has been addressed in recent kernel updates.
Affected Version(s)
Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 6c3653627397a0d6eab19b20a59423e118985a6b
Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 3efcbf25e5ab4d4ad1b7e6ba0869ff85540e3f6e
Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
References
Timeline
Vulnerability published
Vulnerability Reserved