In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hcisync: Avoid use-after-free in dbg for hciremoveadvmonitor()
KASAN reports that there's a use-after-free in hciremoveadvmonitor(). Trawling through the disassembly, you can see that the complaint is from the access in btdevdbg() under the HCIADVMONITOREXTMSFT case. The problem case happens because msftremovemonitor() can end up freeing the monitor structure. Specifically: hciremoveadvmonitor() -> msftremovemonitor() -> msftremovemonitorsync() -> msftlecancelmonitoradvertisementcb() -> hcifreeadv_monitor()
Let's fix the problem by just stashing the relevant data when it's still valid.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54210.json"
}