Impact
The Linux kernel Bluetooth driver btusb maps active SCO links to USB alternate settings via a small lookup table. When the number of active SCO links exceeds the size of that table, the code indexes beyond the array bounds without validation. This can lead to incorrect memory reads or, if an attacker supplies specially crafted input, a crash of the kernel, potentially allowing information disclosure or denial of service.
Affected Systems
All Linux kernel variants that ship the buggy btusb driver are affected. The problem exists before the patch was released; no specific version list is provided.
Risk and Exploitability
The advisory does not provide a CVSS score or EPSS value, but the lack of bounds checks makes the bug stable and exploitable. The likely attack vector is remote via Bluetooth: an attacker can connect a rogue device that initiates many SCO links to trigger the fault. The resulting kernel crash would render the system unavailable and could expose kernel memory contents.
OpenCVE Enrichment