Impact
A use‑after‑free flaw exists in the Linux kernel Bluetooth stack. The bug allows a freed connection object (`hci_conn`) to be accessed during the `le_read_features_complete` callback, potentially enabling an attacker to overwrite memory in kernel space. This could lead to corruption of kernel data structures, arbitrary kernel code execution, or a denial‑of‑service crash. The vulnerability is classified as CWE‑416.
Affected Systems
All Linux kernel releases that include the buggy hci_sync code are affected, regardless of distribution. The patch commit referenced in the advisory (035c25007c9e698bef3826070ee34bb6d778020c and 260dc2be643b4a35b27008490c533613e3e53867) removes the use‑after‑free. Systems running a kernel version before these commits are at risk.
Risk and Exploitability
No CVSS score or EPSS value is provided, and the vulnerability is not currently listed in CISA’s KEV catalog. Information on a publicly available exploit is not disclosed; however, kernel use‑after‑free bugs are historically high‑risk. The attack vector is inferred to be local or remote via the Bluetooth interface, requiring an attacker to deliver malicious Bluetooth traffic to the target device, which could be possible on exposed devices.
OpenCVE Enrichment