Skip to main content

CVE-2024-42141: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-42141cvecve-2024-42141
Published: Tue Jul 30 2024 (07/30/2024, 07:46:35 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ISO: Check socket flag instead of hcon This fixes the following Smatch static checker warning: net/bluetooth/iso.c:1364 iso_sock_recvmsg() error: we previously assumed 'pi->conn->hcon' could be null (line 1359) net/bluetooth/iso.c 1347 static int iso_sock_recvmsg(struct socket *sock, struct msghdr *msg, 1348 size_t len, int flags) 1349 { 1350 struct sock *sk = sock->sk; 1351 struct iso_pinfo *pi = iso_pi(sk); 1352 1353 BT_DBG("sk %p", sk); 1354 1355 if (test_and_clear_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) { 1356 lock_sock(sk); 1357 switch (sk->sk_state) { 1358 case BT_CONNECT2: 1359 if (pi->conn->hcon && ^^^^^^^^^^^^^^ If ->hcon is NULL 1360 test_bit(HCI_CONN_PA_SYNC, &pi->conn->hcon->flags)) { 1361 iso_conn_big_sync(sk); 1362 sk->sk_state = BT_LISTEN; 1363 } else { --> 1364 iso_conn_defer_accept(pi->conn->hcon); ^^^^^^^^^^^^^^ then we're toast 1365 sk->sk_state = BT_CONFIG; 1366 } 1367 release_sock(sk); 1368 return 0; 1369 case BT_CONNECTED: 1370 if (test_bit(BT_SK_PA_SYNC,

AI-Powered Analysis

AILast updated: 06/27/2025, 20:42:03 UTC

Technical Analysis

CVE-2024-42141 is a vulnerability identified in the Linux kernel's Bluetooth ISO (Isochronous Channels) subsystem. The issue arises from improper handling of a socket flag check in the iso_sock_recvmsg() function within the net/bluetooth/iso.c source file. Specifically, the vulnerability is due to an incorrect assumption that the pointer pi->conn->hcon (representing the HCI connection) could never be NULL during certain socket operations. The flawed code attempts to dereference this pointer without a proper NULL check, which can lead to a use-after-free or null pointer dereference scenario. This can cause the kernel to crash or behave unpredictably, potentially leading to a denial of service (DoS) condition. The vulnerability was detected by the Smatch static analysis tool, which flagged the unsafe dereference of pi->conn->hcon. The patch involves changing the code to check the socket flag rather than the hcon pointer directly, ensuring that the pointer is valid before use. The affected Linux kernel versions include specific commits identified by their hashes, indicating that this is a recent and targeted fix. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability impacts the Bluetooth ISO subsystem, which is used for isochronous data transmission over Bluetooth, commonly leveraged in audio streaming and other time-sensitive Bluetooth applications.

Potential Impact

For European organizations, the impact of CVE-2024-42141 primarily revolves around potential denial of service conditions on Linux systems utilizing Bluetooth ISO channels. This could affect devices such as Linux-based IoT gateways, embedded systems, and servers that rely on Bluetooth for audio or other isochronous data streams. A successful exploitation could cause kernel crashes, leading to system downtime and disruption of critical services, especially in environments where Bluetooth connectivity is integral to operations (e.g., healthcare devices, manufacturing automation, or telecommunication infrastructure). While the vulnerability does not appear to allow privilege escalation or remote code execution directly, the resulting instability could be leveraged as part of a broader attack chain or cause operational interruptions. Given the widespread use of Linux in European enterprises, public sector, and industrial control systems, the vulnerability poses a moderate risk. However, the lack of known exploits and the requirement for local access or Bluetooth interaction reduces the likelihood of widespread exploitation. Organizations with Bluetooth-enabled Linux devices should be aware of this vulnerability to prevent potential service disruptions.

Mitigation Recommendations

To mitigate CVE-2024-42141, European organizations should: 1) Apply the latest Linux kernel patches that address this vulnerability as soon as they become available from trusted Linux distributions or upstream sources. 2) Audit and inventory Linux systems that utilize Bluetooth ISO channels, particularly those involved in critical operations or exposed to untrusted Bluetooth devices. 3) Limit Bluetooth exposure by disabling Bluetooth ISO functionality on systems where it is not required. 4) Implement strict access controls and monitoring on systems with Bluetooth capabilities to detect unusual Bluetooth activity or kernel crashes. 5) Employ kernel crash monitoring and automated recovery mechanisms to reduce downtime in case of exploitation. 6) For embedded or IoT devices, coordinate with vendors to ensure timely firmware updates incorporating the patch. 7) Educate system administrators about the risks of Bluetooth-based kernel vulnerabilities and encourage cautious use of Bluetooth peripherals in sensitive environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-07-29T15:50:41.189Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9820c4522896dcbdccb1

Added to database: 5/21/2025, 9:08:48 AM

Last enriched: 6/27/2025, 8:42:03 PM

Last updated: 8/17/2025, 3:53:16 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats