PT-2024-3620 · Linux+6 · Linux Kernel+6
Tianshu Qiu
·
Published
2024-05-03
·
Updated
2026-04-04
·
CVE-2024-27398
CVSS v3.1
7.8
High
| AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions:
Linux kernel (affected versions not specified)
Description:
The vulnerability is related to a use-after-free bug in the sco sock timeout function. When a sco connection is established and the sco socket is released, a timeout work is scheduled to check if the sco disconnection has timed out. However, the sock is deallocated later but is still dereferenced in sco sock timeout, resulting in a use-after-free bug. The root cause of the issue is due to a race condition between the cleanup thread and the worker thread. The KASAN report triggered by the proof-of-concept (POC) shows a slab-use-after-free bug in sco sock timeout.
Recommendations:
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
LPE
Use After Free
Race Condition
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Astra Linux
Linuxmint
Linux Kernel
Red Hat
Red Os
Suse
Ubuntu