|
Message-ID: <20230328140022.GA11153@openwall.com> Date: Tue, 28 Mar 2023 16:00:22 +0200 From: Solar Designer <solar@...nwall.com> To: Zhenghan Wang <wzhmmmmm@...il.com> Cc: oss-security@...ts.openwall.com Subject: Re: CVE-2023-28464: Linux: Bluetooth: hci_conn_cleanup function has double free Hi Zhenghan Wang, Thank you for bringing this to oss-security. On Tue, Mar 28, 2023 at 08:00:00AM +0800, Zhenghan Wang wrote: > This patch drop the hci_dev_put and hci_conn_put function call in > hci_conn_cleanup function, because the object isfreed in hci_conn_del_sysfs > function. > https://lore.kernel.org/lkml/20230309074645.74309-1-wzhmmmmm@gmail.com/ Please remind the Bluetooth subsystem maintainers, such as by "replying" to your own message you had sent them on March 9. When doing so, please also inform them of the CVE ID and of the oss-security posting. For others on oss-security: Zhenghan Wang brought this issue to linux-distros and s@k.o on March 8, brought it to the subsystem maintainers and public Linux mailing lists on March 9 (of which linux-distros and s@k.o were not specifically informed), and then there was no progress until Carlos Lopez from SUSE sent a reminder when we were already just past the maximum embargo duration for linux-distros. Of course, it was inappropriate that no one stayed on top of the issue during the embargo. The corresponding contributing-back task is: https://oss-security.openwall.org/wiki/mailing-lists/distros#contributing-back "9. Stay on top of issues to ensure progress is being made, remind others when there's no apparent progress, as well as when the public disclosure date for an issue is approaching and when it's finally reached (unless the reporter beats you to it by making their mandatory posting to oss-security first) - primary: Gentoo, backup: Amazon" I brought this up on linux-distros and we already heard from Anthony Liguori for Amazon, who as you can see from another thread on oss-security is now also contributing the list statistics, which could help detect such delays too. Thanks, Anthony! However, we have not heard from Gentoo, who are "primary" on this and a couple of other related tasks. Gentoo, please let us all know whether you intend to handle these tasks, or should we remove the assignment? As to the public message on Linux mailing lists on March 9, this time linux-distros did not specifically evaluate whether it was too revealing or not, and whether it'd make sense to keep the issue "embargoed" after such publication. Like I wrote above, the very fact that such a posting was made was brought to linux-distros rather late. However, for further occasions we do have a separate problem here - while we did introduce an exception for Linux kernel where such double-think is accepted, would this one have gotten too far? The posting did not say "security", "vulnerability", nor mention a CVE ID. However, it did mention "double free" in Bluetooth, and it kind of had to - no other reasonable way to justify the patch. Now, not all double free bugs are vulnerabilities - some are not attacker-exposed. (BTW, I did not look into whether this one is.) Yet a bug of this category in a network subsystem would reasonably attract potential attackers' attention. Also or OTOH, "KASAN: slab-use-after-free Read in hci_conn_hash_flush" in syzbot could have attracted attention, too. Alexander
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.