APPLIED: [SRU][N][PATCH 0/1] CVE-2024-50148

Koichiro Den koichiro.den at canonical.com
Fri Feb 7 04:08:59 UTC 2025


On Wed, Jan 22, 2025 at 10:52:30PM GMT, Massimiliano Pellizzer wrote:
> [Impact]
> 
> Bluetooth: bnep: fix wild-memory-access in proto_unregister
> 
> There's issue as follows:
>   KASAN: maybe wild-memory-access in range [0xdead...108-0xdead...10f]
>   CPU: 3 UID: 0 PID: 2805 Comm: rmmod Tainted: G        W
>   RIP: 0010:proto_unregister+0xee/0x400
>   Call Trace:
>    <TASK>
>    __do_sys_delete_module+0x318/0x580
>    do_syscall_64+0xc1/0x1d0
>    entry_SYSCALL_64_after_hwframe+0x77/0x7f
> 
> As bnep_init() ignore bnep_sock_init()'s return value, and bnep_sock_init()
> will cleanup all resource. Then when remove bnep module will call
> bnep_sock_cleanup() to cleanup sock's resource.
> To solve above issue just return bnep_sock_init()'s return value in
> bnep_exit().
> 
> [Fix]
> 
> Oracular: Fixed via upstream stable updates (95df8ca962fbb0)
> Noble: Clean cherry pick from mainline
> Jammy: Fixed via upstream stable updates (1e95961320e711)
> Focal: Fixed via upstream stable updates (84e3d4d674f693)
> Bionic: Sent to ESM ML
> Xenial: Sent to ESM ML
> Trusty: Not affected
> 
> [Test Case]
> 
> Compile and boot tested.
> Loaded and unloaded successfully the kernel module bnep.
> 
> [Where problems could occur]
> 
> A regression here is unlikely due to the very limited scope of the
> patch.
> 
> Ye Bin (1):
>   Bluetooth: bnep: fix wild-memory-access in proto_unregister
> 
>  net/bluetooth/bnep/core.c | 3 +--
>  1 file changed, 1 insertion(+), 2 deletions(-)
> 

Applied to noble:linux master-next branch. Thanks!



More information about the kernel-team mailing list