CVE-2024-26903

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-26903
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26903.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-26903
Downstream
Related
Published
2024-04-17T10:27:51.673Z
Modified
2025-11-28T02:34:17.647906Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security
Details

In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: rfcomm: Fix null-ptr-deref in rfcommchecksecurity

During our fuzz testing of the connection and disconnection process at the RFCOMM layer, we discovered this bug. By comparing the packets from a normal connection and disconnection process with the testcase that triggered a KASAN report. We analyzed the cause of this bug as follows:

  1. In the packets captured during a normal connection, the host sends a Read Encryption Key Size type of HCI_CMD packet (Command Opcode: 0x1408) to the controller to inquire the length of encryption key.After receiving this packet, the controller immediately replies with a Command Completepacket (Event Code: 0x0e) to return the Encryption Key Size.

  2. In our fuzz test case, the timing of the controller's response to this packet was delayed to an unexpected point: after the RFCOMM and L2CAP layers had disconnected but before the HCI layer had disconnected.

  3. After receiving the Encryption Key Size Response at the time described in point 2, the host still called the rfcommchecksecurity function. However, by this time struct l2cap_conn *conn = l2cap_pi(sk)->chan->conn; had already been released, and when the function executed return hci_conn_security(conn->hcon, d->sec_level, auth_type, d->out);, specifically when accessing conn->hcon, a null-ptr-deref error occurred.

To fix this bug, check if sk->sk_state is BTCLOSED before calling rfcommrecvframe in rfcommprocess_rx.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26903.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
369f419c097e82407dd429a202cde9a73d3ae29b
Fixed
5f369efd9d963c1f711a06c9b8baf9f5ce616d85
Fixed
81d7d920a22fd58ef9aedb1bd0a68ee32bd23e96
Fixed
8d1753973f598531baaa2c1033cf7f7b5bb004b0
Fixed
567c0411dc3b424fc7bd1e6109726d7ba32d4f73
Fixed
3ead59bafad05f2967ae2438c0528d53244cfde5
Fixed
5f9fe302dd3a9bbc50f4888464c1773f45166bfd
Fixed
2535b848fa0f42ddff3e5255cf5e742c9b77bb26

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.19.311
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.273
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.214
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.153
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.83
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.23
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.7.11