A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication.
The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Link | Tags |
---|---|
https://www.openwall.com/lists/oss-security/2023/04/16/3 | mailing list third party advisory exploit |
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html | third party advisory mailing list |
https://www.debian.org/security/2023/dsa-5480 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html | third party advisory mailing list |
https://security.netapp.com/advisory/ntap-20240202-0004/ |