Bug Fixes in Linux Kernel 5.10
CVE-2024-27398

Currently unrated

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
14 May 2024

Badges

📈 Score: 285👾 Exploit Exists🟡 Public PoC

What is CVE-2024-27398?

CVE-2024-27398 is a vulnerability identified in the Linux kernel version 5.10, particularly related to Bluetooth connectivity. This flaw pertains to a use-after-free condition that arises when the software manages SCO (Synchronous Connection-Oriented) sockets. When a SCO connection is established and subsequently released, improper handling can cause the software to attempt to access freed memory. If exploited, this vulnerability could lead to instability in systems reliant on Bluetooth functionality, potentially compromising the overall integrity of the Linux environment they support.

Technical Details

CVE-2024-27398 manifests in the handling of SCO sockets within the Linux kernel, specifically during the timeout work scheduled to assess disconnection scenarios. The vulnerability is caused by the following sequence of operations: after a SCO connection is closed and the socket is deallocated, the system may still attempt to reference the now-freed memory when checking for timeout conditions. This leads to a use-after-free scenario, which can impair system stability and may allow for unintended behaviors or crashes. The issue was highlighted through a KASAN (Kernel Address Sanitizer) report that documented the attempts to access freed memory locations.

Potential impact of CVE-2024-27398

  1. System Instability: Exploiting this vulnerability could cause erratic behavior in systems that rely on Bluetooth communication, resulting in crashes or performance degradation.

  2. Security Risks: An attacker could potentially leverage this flaw to execute arbitrary code within the kernel, which could lead to unauthorized access or elevation of privileges on the affected systems.

  3. Operational Disruption: For organizations that integrate Bluetooth technologies into critical workflows, this vulnerability poses a risk of operational disruption, which can hinder productivity and service delivery.

Affected Version(s)

Linux 48669c81a65628ef234cbdd91b9395952c7c27fe < 1b33d55fb7355e27f8c82cd4ecd560f162469249

Linux 37d7ae2b0578f2373674a755402ee722e96edc08 < 3212afd00e3cda790fd0583cb3eaef8f9575a014

Linux a1073aad497d0d071a71f61b721966a176d50c08 < 33a6e92161a78c1073d90e27abe28d746feb0a53

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.