#VU89672 Use-after-free in Linux kernel - CVE-2024-27398


| Updated: 2025-03-14

Vulnerability identifier: #VU89672

Vulnerability risk: Medium

CVSSv4.0: 5.7 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2024-27398

CWE-ID: CWE-416

Exploitation vector: Local network

Exploit availability: Yes

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error within the sco_sock_timeout() function in net/bluetooth/sco.c. A remote attacker can trigger a use-after-free error and perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
http://git.kernel.org/stable/c/483bc08181827fc475643272ffb69c533007e546
http://git.kernel.org/stable/c/1b33d55fb7355e27f8c82cd4ecd560f162469249
http://git.kernel.org/stable/c/3212afd00e3cda790fd0583cb3eaef8f9575a014
http://git.kernel.org/stable/c/33a6e92161a78c1073d90e27abe28d746feb0a53
http://git.kernel.org/stable/c/6a18eeb1b3bbc67c20d9609c31dca6a69b4bcde5
http://git.kernel.org/stable/c/bfab2c1f7940a232cd519e82fff137e308abfd93
http://git.kernel.org/stable/c/012363cb1bec5f33a7b94629ab2c1086f30280f2
http://git.kernel.org/stable/c/50c2037fc28df870ef29d9728c770c8955d32178


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability