-
CVE-2023-53828
- EPSS 0.02%
- Veröffentlicht 09.12.2025 01:29:42
- Zuletzt bearbeitet 09.12.2025 18:37:13
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor()
KSAN reports use-after-free in hci_add_adv_monitor().
While adding an adv monitor,
hci_add_adv_monitor() calls ->
msft_add_monitor_pattern() calls ->
msft_add_monitor_sync() calls ->
msft_le_monitor_advertisement_cb() calls in an error case ->
hci_free_adv_monitor() which frees the *moniter.
This is referenced by bt_dev_dbg() in hci_add_adv_monitor().
Fix the bt_dev_dbg() by using handle instead of monitor->handle.Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
81d8e9f59df63b8358751c1ffed9f1cf5c796909
Version
b747a83690c8f53bc7a3f75899415c699b2c51aa
Status
affected
Version <
aafda69d4807f5edf3558c9534be9b911774e63a
Version
b747a83690c8f53bc7a3f75899415c699b2c51aa
Status
affected
Version <
8d66f7ced51cb924bc90278d6a0a26a52877271a
Version
b747a83690c8f53bc7a3f75899415c699b2c51aa
Status
affected
Version <
a2bcd2b63271a93a695fabbfbf459c603d956d48
Version
b747a83690c8f53bc7a3f75899415c699b2c51aa
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
6.0
Status
affected
Version <
6.0
Version
0
Status
unaffected
Version <=
6.1.*
Version
6.1.53
Status
unaffected
Version <=
6.4.*
Version
6.4.16
Status
unaffected
Version <=
6.5.*
Version
6.5.3
Status
unaffected
Version <=
*
Version
6.6
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.036 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|