Vulnerability identifier: #VU89672
Vulnerability risk: Medium
CVSSv4.0: 5.7 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID:
CWE-ID:
CWE-416
Exploitation vector: Local network
Exploit availability: Yes
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a use-after-free error within the sco_sock_timeout() function in net/bluetooth/sco.c. A remote attacker can trigger a use-after-free error and perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
http://git.kernel.org/stable/c/483bc08181827fc475643272ffb69c533007e546
http://git.kernel.org/stable/c/1b33d55fb7355e27f8c82cd4ecd560f162469249
http://git.kernel.org/stable/c/3212afd00e3cda790fd0583cb3eaef8f9575a014
http://git.kernel.org/stable/c/33a6e92161a78c1073d90e27abe28d746feb0a53
http://git.kernel.org/stable/c/6a18eeb1b3bbc67c20d9609c31dca6a69b4bcde5
http://git.kernel.org/stable/c/bfab2c1f7940a232cd519e82fff137e308abfd93
http://git.kernel.org/stable/c/012363cb1bec5f33a7b94629ab2c1086f30280f2
http://git.kernel.org/stable/c/50c2037fc28df870ef29d9728c770c8955d32178
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.