CVE-2025-40141
Description
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: ISO: Fix possible UAF on iso_conn_free
This attempt to fix similar issue to sco_conn_free where if the conn->sk is not set to NULL may lead to UAF on iso_conn_free.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A use-after-free (UAF) vulnerability in the Linux kernel's Bluetooth ISO subsystem occurs when iso_conn_free fails to clear conn->sk.
Analysis
A use-after-free vulnerability exists in the Linux kernel's Bluetooth ISO (Isochronous) protocol implementation. The flaw occurs in the iso_conn_free function, where the conn->sk pointer (a socket reference) is not set to NULL after the associated socket is freed or released. This is analogous to a previously fixed issue in the SCO (Synchronous Connection-Oriented) protocol (sco_conn_free). If the freed socket is later accessed through the dangling conn->sk pointer, an attacker could trigger a use-after-free condition.
Exploitation
Exploitation requires that an attacker be able to trigger specific Bluetooth operations that cause the freeing of an ISO connection while the socket reference remains accessible. The vulnerability is local and would typically require the attacker to have the ability to interact with the Bluetooth stack, e.g., via unprivileged process access to Bluetooth sockets or crafted Bluetooth communication. No authentication is needed beyond local system access that allows Bluetooth operations.
Impact
A successful exploit could lead to a kernel crash (denial of service) or potentially allow an attacker to achieve arbitrary code execution in the kernel context, depending on how the freed memory is reallocated and controlled. The impact is consistent with typical use-after-free bugs in kernel subsystems.
Mitigation
Patches have been committed to the Linux kernel stable tree. The fix ensures that conn->sk is set to NULL in iso_conn_free, similar to the fix for SCO (git commit references [1] and [2]). Users and distributions are advised to update to a corrected kernel version as soon as possible.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
5eba6d787ec115319145a07d880689777919fc92ad1a155cc9950f095d6c8Vulnerability mechanics
Root cause
"A use-after-free vulnerability occurs in `iso_conn_free` because the `conn->sk` pointer is not set to NULL, allowing access to freed memory."
Attack vector
An attacker can trigger this vulnerability by exploiting the improper handling of the `conn->sk` pointer during the ISO connection teardown process. If `conn->sk` is not set to NULL before the connection is freed, subsequent operations may access the freed memory [patch_id=10813]. The advisory does not provide specific details on the necessary network path or payload shape required to reach this state.
Affected code
The vulnerability exists within the Bluetooth ISO connection handling logic, specifically in the `iso_conn_free` function. This function fails to properly manage the `conn->sk` pointer, leading to a potential use-after-free condition [patch_id=10813].
What the fix does
The patch modifies `iso_conn_free` to ensure that `conn->sk` is explicitly set to NULL when appropriate [patch_id=10813]. This prevents the kernel from attempting to access a stale pointer after the associated connection structure has been freed. This approach mirrors the fix applied to `sco_conn_free` to resolve similar memory safety issues [patch_id=10813].
Preconditions
- configThe system must be using a vulnerable version of the Linux kernel with Bluetooth ISO support enabled.
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- git.kernel.org/stable/c/5319145a07d8bf5b0782b25cb3115825689d42bbnvd
- git.kernel.org/stable/c/80689777919f02328eb873769de4647c9dd3e371nvd
- git.kernel.org/stable/c/9950f095d6c875dbe0c9ebfcf972ec88fdf26fc8nvd
- git.kernel.org/stable/c/c92ad1a155ccfa38b87bd1d998287e1c0a24248dnvd
- git.kernel.org/stable/c/eba6d787ec117a5d2c60f9644e0a39c18542b6benvd
News mentions
0No linked articles in our index yet.