CVE-2024-50125
Bluetooth: SCO: Fix UAF on sco_sock_timeout
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: SCO: Fix UAF on sco_sock_timeout conn->sk maybe have been unlinked/freed while waiting for sco_conn_lock
so this checks if the conn->sk is still valid by checking if it part of
sco_sk_list.
En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: SCO: Se corrige que UAF en sco_sock_timeout conn->sk pueda haberse desvinculado/liberado mientras se esperaba sco_conn_lock, por lo que esto verifica si conn->sk aún es válido verificando si es parte de sco_sk_list.
A use-after-free vulnerability was found in the Linux kernel's Bluetooth SCO. When sco_sock_timeout() is called, conn->sk may be unlinked/freed while waiting for sco_conn_lock. This checks if the conn->sk is still valid by checking if it is part of
sco_sk_list, leading to a loss of availability and system confidentiality.
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: SCO: Fix UAF on sco_sock_timeout conn->sk maybe have been unlinked/freed while waiting for sco_conn_lock so this checks if the conn->sk is still valid by checking if it part of sco_sk_list.
Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-10-21 CVE Reserved
- 2024-11-05 CVE Published
- 2024-12-19 CVE Updated
- 2025-03-18 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-416: Use After Free
CAPEC
References (13)
URL | Tag | Source |
---|---|---|
https://git.kernel.org/stable/c/ba316be1b6a00db7126ed9a39f9bee434a508043 | Vuln. Introduced | |
https://git.kernel.org/stable/c/fea63ccd928c01573306983346588b26cffb5572 | Vuln. Introduced | |
https://git.kernel.org/stable/c/48669c81a65628ef234cbdd91b9395952c7c27fe | Vuln. Introduced | |
https://git.kernel.org/stable/c/37d7ae2b0578f2373674a755402ee722e96edc08 | Vuln. Introduced | |
https://git.kernel.org/stable/c/a1073aad497d0d071a71f61b721966a176d50c08 | Vuln. Introduced | |
https://git.kernel.org/stable/c/ec1f74319bb35c1c90c25014ec0f6ea6c3ca2134 | Vuln. Introduced | |
https://git.kernel.org/stable/c/b657bba82ff6a007d84fd076bd73b11131726a2b | Vuln. Introduced |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2024-50125 | 2024-12-19 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2323937 | 2024-12-19 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 5.15 < 6.1.115 Search vendor "Linux" for product "Linux Kernel" and version " >= 5.15 < 6.1.115" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 5.15 < 6.6.59 Search vendor "Linux" for product "Linux Kernel" and version " >= 5.15 < 6.6.59" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 5.15 < 6.11.6 Search vendor "Linux" for product "Linux Kernel" and version " >= 5.15 < 6.11.6" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 5.15 < 6.12 Search vendor "Linux" for product "Linux Kernel" and version " >= 5.15 < 6.12" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 4.14.263 Search vendor "Linux" for product "Linux Kernel" and version "4.14.263" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 4.19.207 Search vendor "Linux" for product "Linux Kernel" and version "4.19.207" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 5.4.148 Search vendor "Linux" for product "Linux Kernel" and version "5.4.148" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 5.10.67 Search vendor "Linux" for product "Linux Kernel" and version "5.10.67" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 5.13.19 Search vendor "Linux" for product "Linux Kernel" and version "5.13.19" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 5.14.6 Search vendor "Linux" for product "Linux Kernel" and version "5.14.6" | en |
Affected
|