First published: Thu Aug 22 2024(Updated: )
Yuxuan Hu discovered that the Bluetooth RFCOMM protocol driver in the Linux Kernel contained a race condition, leading to a NULL pointer dereference. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2024-22099) It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel, leading to a null pointer dereference vulnerability. A privileged local attacker could use this to possibly cause a denial of service (system crash). (CVE-2024-24860) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems:
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-6972-2 is high due to the potential for a denial of service caused by a null pointer dereference.
To fix USN-6972-2, you should upgrade your Linux kernel to the specified versions in the advisory.
The vulnerability in USN-6972-2 is caused by a race condition in the Bluetooth RFCOMM protocol driver.
Ubuntu 16.04 and 18.04 are affected by USN-6972-2, particularly specific kernel package versions listed in the advisory.
Yes, USN-6972-2 can lead to a system crash if exploited, making it critical to apply the related patches.