CVE-2023-51779Use After Free in Linux

Severity
7.0HIGHNVD
OSV7.8OSV5.5OSV4.7
EPSS
0.1%
top 68.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 29
Latest updateAug 14

Description

bt_sock_recvmsg in net/bluetooth/af_bluetooth.c in the Linux kernel through 6.6.8 has a use-after-free because of a bt_sock_ioctl race condition.

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9

Affected Packages7 packages

Debianlinux/linux_kernel< 5.10.209-1+3
Ubuntulinux/linux_kernel< 5.4.0-173.191+3
debiandebian/linux< linux 6.1.69-1 (bookworm)

🔴Vulnerability Details

16
OSV
linux, linux-aws, linux-kvm, linux-lts-xenial vulnerabilities2024-04-19
OSV
linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp, linux-gcp-4.15, linux-hwe, linux-kvm, linux-oracle vulnerabilities2024-04-19
OSV
linux-intel-iotg, linux-intel-iotg-5.15 vulnerabilities2024-03-27
OSV
linux-azure, linux-azure-5.4 vulnerabilities2024-03-25
OSV
linux-aws, linux-aws-5.15 vulnerabilities2024-03-20

📋Vendor Advisories

16
CISA ICS
Siemens SINEC OS2025-08-14
Ubuntu
Linux kernel vulnerabilities2024-04-19
Ubuntu
Linux kernel vulnerabilities2024-04-19
Ubuntu
Linux kernel (Intel IoTG) vulnerabilities2024-03-27
Ubuntu
Linux kernel (Azure) vulnerabilities2024-03-25

💬Community

1
Bugzilla
CVE-2023-51779 kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg2024-01-04
CVE-2023-51779 — Use After Free in Debian Linux | cvebase