CVE-2025-38118

7.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in the Linux kernel's Bluetooth management subsystem. It allows attackers with local access to potentially crash the kernel or execute arbitrary code by exploiting improper memory handling during advertisement monitor removal. Systems running vulnerable Linux kernel versions with Bluetooth enabled are affected.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Versions containing the vulnerable code up to the fix commits (specific versions depend on distribution backports)
Operating Systems: Linux distributions with vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Bluetooth functionality to be enabled and accessible. Systems without Bluetooth hardware or with Bluetooth disabled are not vulnerable.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash or potential privilege escalation to kernel-level code execution, allowing complete system compromise.

🟠

Likely Case

Kernel crash causing system instability or denial of service, requiring reboot to restore functionality.

🟢

If Mitigated

Limited to denial of service if exploit attempts are blocked by security controls or if Bluetooth is disabled.

🌐 Internet-Facing: LOW - Requires local access to the system; not directly exploitable over network.
🏢 Internal Only: MEDIUM - Local attackers or malicious users could exploit this to disrupt systems or potentially escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and knowledge of Bluetooth management operations. The KASAN report suggests the vulnerability is reliably triggerable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits: 32aa2fbe319f33b0318ec6f4fceb63879771a286, 3c9aba9cbdf163e2654be9f82d43ff8a04273962, 9df3e5e7f7e4653fd9802878cedc36defc5ef42d, 9f66b6531c2b4e996bb61720ee94adb4b2e8d1be, e6ed54e86aae9e4f7286ce8d5c73780f91b48d1c

Vendor Advisory: https://git.kernel.org/stable/c/32aa2fbe319f33b0318ec6f4fceb63879771a286

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Check your distribution's security advisories for backported patches. 3. Reboot the system after kernel update.

🔧 Temporary Workarounds

Disable Bluetooth

linux

Completely disable Bluetooth functionality to prevent exploitation

systemctl stop bluetooth
systemctl disable bluetooth
rfkill block bluetooth

Restrict Bluetooth access

linux

Use kernel module blacklisting to prevent Bluetooth module loading

echo 'blacklist btusb' >> /etc/modprobe.d/blacklist-bluetooth.conf
echo 'blacklist bluetooth' >> /etc/modprobe.d/blacklist-bluetooth.conf
update-initramfs -u

🧯 If You Can't Patch

  • Disable Bluetooth functionality entirely using system controls
  • Implement strict access controls to prevent unauthorized local users from accessing Bluetooth management interfaces

🔍 How to Verify

Check if Vulnerable:

Check if Bluetooth is enabled and kernel version is vulnerable: lsmod | grep -i bluetooth && uname -r

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits: uname -r and check with distribution's security advisory

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages in /var/log/kern.log or dmesg
  • KASAN reports of use-after-free in mgmt_remove_adv_monitor_complete
  • Bluetooth subsystem crashes

Network Indicators:

  • Unusual Bluetooth management traffic from local processes

SIEM Query:

source="kernel" AND ("KASAN" OR "use-after-free" OR "mgmt_remove_adv_monitor")

🔗 References

📤 Share & Export