CVE-2025-68304
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's Bluetooth subsystem involves improper locking and lookup of hci_conn objects on the RX (receive) path. The existing locking mechanism does not prevent concurrent modification or deletion of hci_conn pointers, which can lead to use-after-free (UAF) conditions. The issue arises because some code paths delete hci_conn objects outside the expected workqueue context, causing race conditions. The fix involves moving the lookup and usage of hci_conn into a single critical section to ensure safe concurrent access and prevent UAF crashes.
How can this vulnerability impact me? :
This vulnerability can cause crashes in the Bluetooth subsystem of the Linux kernel due to use-after-free errors. Such crashes may lead to denial of service by destabilizing Bluetooth connectivity or the kernel itself. In some cases, use-after-free vulnerabilities can be exploited to execute arbitrary code or escalate privileges, but the description primarily indicates crash risks.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved in the Linux kernel by improving locking mechanisms around hci_conn usage in the Bluetooth hci_core RX path. Immediate mitigation steps include updating your Linux kernel to a version that includes the fix for this issue, which involves moving the lookup of hci_conn and associated socket-specific connections to protocol receive handlers within a single critical section to prevent use-after-free conditions.