Vulnerability identifier: #VU93869
Vulnerability risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-200
Exploitation vector: Local network
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to an error within the hci_io_capa_request_evt() function in net/bluetooth/hci_event.c when handling HCI_EV_IO_CAPA_REQUEST packets. A remote attacker on the local network can force the system to assume that the remote peer
does support SSP and potentially gain access to sensitive information.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/afec8f772296dd8e5a2a6f83bbf99db1b9ca877f
https://git.kernel.org/stable/c/79820a7e1e057120c49be07cbe10643d0706b259
https://git.kernel.org/stable/c/df193568d61234c81de7ed4d540c01975de60277
https://git.kernel.org/stable/c/c3df637266df29edee85e94cab5fd7041e5753ba
https://git.kernel.org/stable/c/30a5e812f78e3d1cced90e1ed750bf027599205f
https://git.kernel.org/stable/c/fba268ac36ab19f9763ff90d276cde0ce6cd5f31
https://git.kernel.org/stable/c/8e2758cc25891d2b76717aaf89b40ed215de188c
https://git.kernel.org/stable/c/7e74aa53a68bf60f6019bd5d9a9a1406ec4d4865
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.