CVE-2026-31408 PUBLISHED

Bluetooth: SCO: Fix use-after-free in sco_recv_frame() due to missing sock_hold

Assigner: Linux
Reserved: 09.03.2026 Published: 06.04.2026 Updated: 06.04.2026

In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: SCO: Fix use-after-free in sco_recv_frame() due to missing sock_hold

sco_recv_frame() reads conn->sk under sco_conn_lock() but immediately releases the lock without holding a reference to the socket. A concurrent close() can free the socket between the lock release and the subsequent sk->sk_state access, resulting in a use-after-free.

Other functions in the same file (sco_sock_timeout(), sco_conn_del()) correctly use sco_sock_hold() to safely hold a reference under the lock.

Fix by using sco_sock_hold() to take a reference before releasing the lock, and adding sock_put() on all exit paths.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 45aaca995e4a7a05b272a58e7ab2fff4f611b8f1 (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 108b81514d8f2535eb16651495cefb2250528db3 (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 7197462e90b8ce15caa1ae15d4bc2bb8cd21b11e (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to e76e8f0581ef555eacc11dbb095e602fb30a5361 (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 598dbba9919c5e36c54fe1709b557d64120cb94b (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 2.6.12 is affected
  • unaffected from 0 to 2.6.12 (excl.)
  • unaffected from 6.6.131 to 6.6.* (incl.)
  • unaffected from 6.12.80 to 6.12.* (incl.)
  • unaffected from 6.18.21 to 6.18.* (incl.)
  • unaffected from 6.19.11 to 6.19.* (incl.)
  • unaffected from 7.0-rc6 to * (incl.)

References