CVE-2025-39860
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
19/09/2025
Última modificación:
19/09/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen()<br />
<br />
syzbot reported the splat below without a repro.<br />
<br />
In the splat, a single thread calling bt_accept_dequeue() freed sk<br />
and touched it after that.<br />
<br />
The root cause would be the racy l2cap_sock_cleanup_listen() call<br />
added by the cited commit.<br />
<br />
bt_accept_dequeue() is called under lock_sock() except for<br />
l2cap_sock_release().<br />
<br />
Two threads could see the same socket during the list iteration<br />
in bt_accept_dequeue():<br />
<br />
CPU1 CPU2 (close())<br />
---- ----<br />
sock_hold(sk) sock_hold(sk);<br />
lock_sock(sk)
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/2ca99fc3512a8074de20ee52a87b492dfcc41a4d
- https://git.kernel.org/stable/c/306b0991413b482dbf5585b423022123bb505966
- https://git.kernel.org/stable/c/3dff390f55ccd9ce12e91233849769b5312180c2
- https://git.kernel.org/stable/c/47f6090bcf75c369695d21c3f179db8a56bbbd49
- https://git.kernel.org/stable/c/6077d16b5c0f65d571eee709de2f0541fb5ef0ca
- https://git.kernel.org/stable/c/83e1d9892ef51785cf0760b7681436760dda435a
- https://git.kernel.org/stable/c/862c628108562d8c7a516a900034823b381d3cba
- https://git.kernel.org/stable/c/964cbb198f9c46c2b2358cd1faffc04c1e8248cf