Skip to main content

CVE-2024-26903: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-26903cvecve-2024-26903
Published: Wed Apr 17 2024 (04/17/2024, 10:27:51 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security During our fuzz testing of the connection and disconnection process at the RFCOMM layer, we discovered this bug. By comparing the packets from a normal connection and disconnection process with the testcase that triggered a KASAN report. We analyzed the cause of this bug as follows: 1. In the packets captured during a normal connection, the host sends a `Read Encryption Key Size` type of `HCI_CMD` packet (Command Opcode: 0x1408) to the controller to inquire the length of encryption key.After receiving this packet, the controller immediately replies with a Command Completepacket (Event Code: 0x0e) to return the Encryption Key Size. 2. In our fuzz test case, the timing of the controller's response to this packet was delayed to an unexpected point: after the RFCOMM and L2CAP layers had disconnected but before the HCI layer had disconnected. 3. After receiving the Encryption Key Size Response at the time described in point 2, the host still called the rfcomm_check_security function. However, by this time `struct l2cap_conn *conn = l2cap_pi(sk)->chan->conn;` had already been released, and when the function executed `return hci_conn_security(conn->hcon, d->sec_level, auth_type, d->out);`, specifically when accessing `conn->hcon`, a null-ptr-deref error occurred. To fix this bug, check if `sk->sk_state` is BT_CLOSED before calling rfcomm_recv_frame in rfcomm_process_rx.

AI-Powered Analysis

AILast updated: 06/29/2025, 20:10:26 UTC

Technical Analysis

CVE-2024-26903 is a medium-severity vulnerability in the Linux kernel's Bluetooth RFCOMM layer that results from a null pointer dereference (CWE-476). The flaw was discovered during fuzz testing of the connection and disconnection processes at the RFCOMM layer, which is responsible for emulating serial ports over Bluetooth. The vulnerability occurs due to a timing issue in handling the 'Read Encryption Key Size' HCI command (opcode 0x1408). Normally, the Bluetooth controller responds promptly with the encryption key size after receiving this command. However, in the fuzz test case, the controller's response was delayed until after the RFCOMM and L2CAP layers had disconnected but before the HCI layer had disconnected. When the host receives this delayed response, it calls the rfcomm_check_security function, which attempts to access a released connection structure pointer (conn->hcon). Since the connection has already been freed, this results in a null pointer dereference and kernel crash (denial of service). The fix involves checking if the socket state (sk->sk_state) is BT_CLOSED before processing received RFCOMM frames, preventing access to freed memory. The vulnerability requires local privileges (low attack vector) and low complexity, with no user interaction needed. It impacts availability by causing kernel crashes but does not affect confidentiality or integrity. The affected versions are specific Linux kernel commits identified by their hashes. No known exploits are reported in the wild yet, but the flaw could be triggered by a local attacker with Bluetooth access to cause denial of service on affected systems.

Potential Impact

For European organizations, this vulnerability primarily poses a risk of denial of service on Linux systems with Bluetooth enabled, particularly those using the affected kernel versions. This could disrupt critical services or operations relying on Bluetooth connectivity, such as industrial control systems, medical devices, or enterprise laptops and mobile devices. Organizations with extensive Linux deployments in sectors like manufacturing, healthcare, and telecommunications could face operational interruptions. Since the flaw requires local or nearby Bluetooth access, attackers would need to be within wireless range, which somewhat limits remote exploitation but does not eliminate risk in densely populated or public environments. The vulnerability does not expose data confidentiality or integrity but could be leveraged to cause system instability or downtime, impacting business continuity and potentially safety-critical systems. The absence of known exploits reduces immediate risk, but the medium CVSS score and ease of triggering kernel crashes warrant prompt attention.

Mitigation Recommendations

European organizations should prioritize updating Linux kernels to versions that include the patch for CVE-2024-26903 as soon as they become available. Until patches are applied, organizations should consider disabling Bluetooth on Linux systems where it is not essential, especially on critical infrastructure devices. For systems requiring Bluetooth, restricting physical access and Bluetooth pairing to trusted devices only can reduce exposure. Network segmentation and monitoring for unusual Bluetooth activity can help detect potential exploitation attempts. Additionally, administrators should audit Linux kernel versions in use across their environments to identify vulnerable systems. Incorporating Bluetooth security best practices, such as enforcing strong authentication and encryption, can further mitigate risks. Finally, organizations should maintain incident response plans that include procedures for handling denial of service events caused by kernel crashes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.187Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe3edc

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 6/29/2025, 8:10:26 PM

Last updated: 8/6/2025, 1:44:55 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats