Impact
A concurrent close operation can free the socket after the lock in sco_recv_frame() is released but before the socket state is accessed, causing a use-after-free. This memory corruption may lead to kernel crashes or permit an attacker to execute arbitrary kernel code, potentially escalating privileges. The vulnerability resides in the Bluetooth SCO subsystem and requires a malicious or malformed SCO frame transmitted during a connection.
Affected Systems
All Linux kernel implementations that contain the vulnerable sco_recv_frame() routine. No specific kernel versions are listed in the CNA data, so any kernel prior to the patch containing this fix is susceptible.
Risk and Exploitability
The CVSS score of 8.8 indicates high severity, while an EPSS score of less than 1% suggests low likelihood of exploitation. The vulnerability is not in the CISA KEV catalog. Based on the description, the likely attack vector is a Bluetooth device that initiates or sends SCO frames; an attacker must be able to connect or interfere with a target’s Bluetooth stack to trigger the use-after-free.
OpenCVE Enrichment