-

CVE-2023-54120

In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix race condition in hidp_session_thread

There is a potential race condition in hidp_session_thread that may
lead to use-after-free. For instance, the timer is active while
hidp_del_timer is called in hidp_session_thread(). After hidp_session_put,
then 'session' will be freed, causing kernel panic when hidp_idle_timeout
is running.

The solution is to use del_timer_sync instead of del_timer.

Here is the call trace:

? hidp_session_probe+0x780/0x780
call_timer_fn+0x2d/0x1e0
__run_timers.part.0+0x569/0x940
hidp_session_probe+0x780/0x780
call_timer_fn+0x1e0/0x1e0
ktime_get+0x5c/0xf0
lapic_next_deadline+0x2c/0x40
clockevents_program_event+0x205/0x320
run_timer_softirq+0xa9/0x1b0
__do_softirq+0x1b9/0x641
__irq_exit_rcu+0xdc/0x190
irq_exit_rcu+0xe/0x20
sysvec_apic_timer_interrupt+0xa1/0xc0
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 152f47bd6b995e0e98c85672f6d19894bc287ef2
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 5f3d214d19899183d4e0cce7552998262112e4ab
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 8a99e6200c38b78a45dcd12a6bdc43fdf4dc36be
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < f7ec5ca433ceead8d9d78fd2febff094f289441d
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 0efb276d5848a3accc37c6f41b85e442c4768169
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < f6719fd8f409fa1da8dc956e93822d25e1e8b360
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 248af9feca062a4ca9c3f2ccf67056c8a5eb817f
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < c95930abd687fcd1aa040dc4fe90dff947916460
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.12
Status affected
Version < 2.6.12
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.313
Status unaffected
Version <= 4.19.*
Version 4.19.281
Status unaffected
Version <= 5.4.*
Version 5.4.241
Status unaffected
Version <= 5.10.*
Version 5.10.178
Status unaffected
Version <= 5.15.*
Version 5.15.108
Status unaffected
Version <= 6.1.*
Version 6.1.25
Status unaffected
Version <= 6.2.*
Version 6.2.12
Status unaffected
Version <= *
Version 6.3
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.1
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.