CVE-2024-42141 (GCVE-0-2024-42141)
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2025-05-04 12:57
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ISO: Check socket flag instead of hcon This fixes the following Smatch static checker warning: net/bluetooth/iso.c:1364 iso_sock_recvmsg() error: we previously assumed 'pi->conn->hcon' could be null (line 1359) net/bluetooth/iso.c 1347 static int iso_sock_recvmsg(struct socket *sock, struct msghdr *msg, 1348 size_t len, int flags) 1349 { 1350 struct sock *sk = sock->sk; 1351 struct iso_pinfo *pi = iso_pi(sk); 1352 1353 BT_DBG("sk %p", sk); 1354 1355 if (test_and_clear_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) { 1356 lock_sock(sk); 1357 switch (sk->sk_state) { 1358 case BT_CONNECT2: 1359 if (pi->conn->hcon && ^^^^^^^^^^^^^^ If ->hcon is NULL 1360 test_bit(HCI_CONN_PA_SYNC, &pi->conn->hcon->flags)) { 1361 iso_conn_big_sync(sk); 1362 sk->sk_state = BT_LISTEN; 1363 } else { --> 1364 iso_conn_defer_accept(pi->conn->hcon); ^^^^^^^^^^^^^^ then we're toast 1365 sk->sk_state = BT_CONFIG; 1366 } 1367 release_sock(sk); 1368 return 0; 1369 case BT_CONNECTED: 1370 if (test_bit(BT_SK_PA_SYNC,
Impacted products
Vendor Product Version
Linux Linux Version: fbdc4bc47268953c80853489f696e02d61f9a2c6
Version: fbdc4bc47268953c80853489f696e02d61f9a2c6
Version: fbdc4bc47268953c80853489f696e02d61f9a2c6
Version: c03a10bd5b6ccb22921e04bcddc987410df7e7a9
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T04:54:32.592Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/045669710464a21c67e690ef14698fd71857cb11"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/33fabef489169c6db87843ef23351ed0d5e51ad8"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/596b6f081336e77764ca35cfeab66d0fcdbe544e"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-42141",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T16:15:53.613577Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T17:34:35.470Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/bluetooth/iso.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "045669710464a21c67e690ef14698fd71857cb11",
              "status": "affected",
              "version": "fbdc4bc47268953c80853489f696e02d61f9a2c6",
              "versionType": "git"
            },
            {
              "lessThan": "33fabef489169c6db87843ef23351ed0d5e51ad8",
              "status": "affected",
              "version": "fbdc4bc47268953c80853489f696e02d61f9a2c6",
              "versionType": "git"
            },
            {
              "lessThan": "596b6f081336e77764ca35cfeab66d0fcdbe544e",
              "status": "affected",
              "version": "fbdc4bc47268953c80853489f696e02d61f9a2c6",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "c03a10bd5b6ccb22921e04bcddc987410df7e7a9",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "net/bluetooth/iso.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.6"
            },
            {
              "lessThan": "6.6",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.39",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.9.*",
              "status": "unaffected",
              "version": "6.9.9",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.10",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.39",
                  "versionStartIncluding": "6.6",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.9.9",
                  "versionStartIncluding": "6.6",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.10",
                  "versionStartIncluding": "6.6",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "6.5.12",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Check socket flag instead of hcon\n\nThis fixes the following Smatch static checker warning:\n\nnet/bluetooth/iso.c:1364 iso_sock_recvmsg()\nerror: we previously assumed \u0027pi-\u003econn-\u003ehcon\u0027 could be null (line 1359)\n\nnet/bluetooth/iso.c\n1347 static int iso_sock_recvmsg(struct socket *sock, struct msghdr *msg,\n1348                             size_t len, int flags)\n1349 {\n1350         struct sock *sk = sock-\u003esk;\n1351         struct iso_pinfo *pi = iso_pi(sk);\n1352\n1353         BT_DBG(\"sk %p\", sk);\n1354\n1355         if (test_and_clear_bit(BT_SK_DEFER_SETUP,\n                                      \u0026bt_sk(sk)-\u003eflags)) {\n1356                 lock_sock(sk);\n1357                 switch (sk-\u003esk_state) {\n1358                 case BT_CONNECT2:\n1359                         if (pi-\u003econn-\u003ehcon \u0026\u0026\n                                     ^^^^^^^^^^^^^^ If -\u003ehcon is NULL\n\n1360                             test_bit(HCI_CONN_PA_SYNC,\n                                         \u0026pi-\u003econn-\u003ehcon-\u003eflags)) {\n1361                                 iso_conn_big_sync(sk);\n1362                                 sk-\u003esk_state = BT_LISTEN;\n1363                         } else {\n--\u003e 1364                         iso_conn_defer_accept(pi-\u003econn-\u003ehcon);\n                                                       ^^^^^^^^^^^^^^\n                                                       then we\u0027re toast\n\n1365                                 sk-\u003esk_state = BT_CONFIG;\n1366                         }\n1367                         release_sock(sk);\n1368                         return 0;\n1369                 case BT_CONNECTED:\n1370                         if (test_bit(BT_SK_PA_SYNC,"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T12:57:46.234Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/045669710464a21c67e690ef14698fd71857cb11"
        },
        {
          "url": "https://git.kernel.org/stable/c/33fabef489169c6db87843ef23351ed0d5e51ad8"
        },
        {
          "url": "https://git.kernel.org/stable/c/596b6f081336e77764ca35cfeab66d0fcdbe544e"
        }
      ],
      "title": "Bluetooth: ISO: Check socket flag instead of hcon",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-42141",
    "datePublished": "2024-07-30T07:46:35.174Z",
    "dateReserved": "2024-07-29T15:50:41.189Z",
    "dateUpdated": "2025-05-04T12:57:46.234Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-42141\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-07-30T08:15:05.917\",\"lastModified\":\"2024-12-11T15:17:03.930\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nBluetooth: ISO: Check socket flag instead of hcon\\n\\nThis fixes the following Smatch static checker warning:\\n\\nnet/bluetooth/iso.c:1364 iso_sock_recvmsg()\\nerror: we previously assumed \u0027pi-\u003econn-\u003ehcon\u0027 could be null (line 1359)\\n\\nnet/bluetooth/iso.c\\n1347 static int iso_sock_recvmsg(struct socket *sock, struct msghdr *msg,\\n1348                             size_t len, int flags)\\n1349 {\\n1350         struct sock *sk = sock-\u003esk;\\n1351         struct iso_pinfo *pi = iso_pi(sk);\\n1352\\n1353         BT_DBG(\\\"sk %p\\\", sk);\\n1354\\n1355         if (test_and_clear_bit(BT_SK_DEFER_SETUP,\\n                                      \u0026bt_sk(sk)-\u003eflags)) {\\n1356                 lock_sock(sk);\\n1357                 switch (sk-\u003esk_state) {\\n1358                 case BT_CONNECT2:\\n1359                         if (pi-\u003econn-\u003ehcon \u0026\u0026\\n                                     ^^^^^^^^^^^^^^ If -\u003ehcon is NULL\\n\\n1360                             test_bit(HCI_CONN_PA_SYNC,\\n                                         \u0026pi-\u003econn-\u003ehcon-\u003eflags)) {\\n1361                                 iso_conn_big_sync(sk);\\n1362                                 sk-\u003esk_state = BT_LISTEN;\\n1363                         } else {\\n--\u003e 1364                         iso_conn_defer_accept(pi-\u003econn-\u003ehcon);\\n                                                       ^^^^^^^^^^^^^^\\n                                                       then we\u0027re toast\\n\\n1365                                 sk-\u003esk_state = BT_CONFIG;\\n1366                         }\\n1367                         release_sock(sk);\\n1368                         return 0;\\n1369                 case BT_CONNECTED:\\n1370                         if (test_bit(BT_SK_PA_SYNC,\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: ISO: Verifique el indicador de socket en lugar de hcon. Esto corrige la siguiente advertencia del verificador est\u00e1tico de Smatch: net/bluetooth/iso.c:1364 iso_sock_recvmsg() error: previamente asumimos \u0027pi -\u0026gt;conn-\u0026gt;hcon\u0027 podr\u00eda ser nulo (l\u00ednea 1359) net/bluetooth/iso.c 1347 static int iso_sock_recvmsg(struct socket *sock, struct msghdr *msg, 1348 size_t len, int flags) 1349 { 1350 struct sock *sk = calcet\u00edn-\u0026gt;sk; 1351 estructura iso_pinfo *pi = iso_pi(sk); 1352 1353 BT_DBG(\\\"sk%p\\\",sk); 1354 1355 if (test_and_clear_bit(BT_SK_DEFER_SETUP, \u0026amp;bt_sk(sk)-\u0026gt;flags)) { 1356 lock_sock(sk); 1357 interruptor (sk-\u0026gt;sk_state) { 1358 caso BT_CONNECT2: 1359 si (pi-\u0026gt;conn-\u0026gt;hcon \u0026amp;\u0026amp; ^^^^^^^^^^^^^^ Si -\u0026gt;hcon es NULL 1360 test_bit(HCI_CONN_PA_SYNC, \u0026amp;pi -\u0026gt;conn-\u0026gt;hcon-\u0026gt;flags)) { 1361 iso_conn_big_sync(sk); 1362 sk-\u0026gt;sk_state = BT_LISTEN; 1363 } else { --\u0026gt; 1364 iso_conn_defer_accept(pi-\u0026gt;conn-\u0026gt;hcon); ^^^^^^^^^^^^^^ entonces estamos 1365 sk-\u0026gt;sk_state = BT_CONFIG; 1366 } 1367 liberaci\u00f3n_sock(sk); 1368 devuelve 0; 1369 caso BT_CONNECTED: 1370 si (test_bit(BT_SK_PA_SYNC,\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.5.12\",\"versionEndExcluding\":\"6.6\",\"matchCriteriaId\":\"AFD63F94-BD00-4EF2-9873-45E8DED18B9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.6\",\"versionEndExcluding\":\"6.6.39\",\"matchCriteriaId\":\"00F6F32E-C522-4E2D-BA6B-B110CFD4B83F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.9.9\",\"matchCriteriaId\":\"ADCC1407-0CB3-4C8F-B4C5-07F682CD7085\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EBB4392-5FA6-4DA9-9772-8F9C750109FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"331C2F14-12C7-45D5-893D-8C52EE38EA10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"3173713D-909A-4DD3-9DD4-1E171EB057EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"79F18AFA-40F7-43F0-BA30-7BDB65F918B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD973AA4-A789-49BD-8D57-B2846935D3C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F3E9E0C-AC3E-4967-AF80-6483E8AB0078\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/045669710464a21c67e690ef14698fd71857cb11\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/33fabef489169c6db87843ef23351ed0d5e51ad8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/596b6f081336e77764ca35cfeab66d0fcdbe544e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/045669710464a21c67e690ef14698fd71857cb11\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/33fabef489169c6db87843ef23351ed0d5e51ad8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/596b6f081336e77764ca35cfeab66d0fcdbe544e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/045669710464a21c67e690ef14698fd71857cb11\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/33fabef489169c6db87843ef23351ed0d5e51ad8\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/596b6f081336e77764ca35cfeab66d0fcdbe544e\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T04:54:32.592Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-42141\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T16:15:53.613577Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:24.637Z\"}}], \"cna\": {\"title\": \"Bluetooth: ISO: Check socket flag instead of hcon\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"fbdc4bc47268953c80853489f696e02d61f9a2c6\", \"lessThan\": \"045669710464a21c67e690ef14698fd71857cb11\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"fbdc4bc47268953c80853489f696e02d61f9a2c6\", \"lessThan\": \"33fabef489169c6db87843ef23351ed0d5e51ad8\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"fbdc4bc47268953c80853489f696e02d61f9a2c6\", \"lessThan\": \"596b6f081336e77764ca35cfeab66d0fcdbe544e\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"c03a10bd5b6ccb22921e04bcddc987410df7e7a9\", \"versionType\": \"git\"}], \"programFiles\": [\"net/bluetooth/iso.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.6\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"6.6\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"6.6.39\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.9.9\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.9.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"net/bluetooth/iso.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/045669710464a21c67e690ef14698fd71857cb11\"}, {\"url\": \"https://git.kernel.org/stable/c/33fabef489169c6db87843ef23351ed0d5e51ad8\"}, {\"url\": \"https://git.kernel.org/stable/c/596b6f081336e77764ca35cfeab66d0fcdbe544e\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nBluetooth: ISO: Check socket flag instead of hcon\\n\\nThis fixes the following Smatch static checker warning:\\n\\nnet/bluetooth/iso.c:1364 iso_sock_recvmsg()\\nerror: we previously assumed \u0027pi-\u003econn-\u003ehcon\u0027 could be null (line 1359)\\n\\nnet/bluetooth/iso.c\\n1347 static int iso_sock_recvmsg(struct socket *sock, struct msghdr *msg,\\n1348                             size_t len, int flags)\\n1349 {\\n1350         struct sock *sk = sock-\u003esk;\\n1351         struct iso_pinfo *pi = iso_pi(sk);\\n1352\\n1353         BT_DBG(\\\"sk %p\\\", sk);\\n1354\\n1355         if (test_and_clear_bit(BT_SK_DEFER_SETUP,\\n                                      \u0026bt_sk(sk)-\u003eflags)) {\\n1356                 lock_sock(sk);\\n1357                 switch (sk-\u003esk_state) {\\n1358                 case BT_CONNECT2:\\n1359                         if (pi-\u003econn-\u003ehcon \u0026\u0026\\n                                     ^^^^^^^^^^^^^^ If -\u003ehcon is NULL\\n\\n1360                             test_bit(HCI_CONN_PA_SYNC,\\n                                         \u0026pi-\u003econn-\u003ehcon-\u003eflags)) {\\n1361                                 iso_conn_big_sync(sk);\\n1362                                 sk-\u003esk_state = BT_LISTEN;\\n1363                         } else {\\n--\u003e 1364                         iso_conn_defer_accept(pi-\u003econn-\u003ehcon);\\n                                                       ^^^^^^^^^^^^^^\\n                                                       then we\u0027re toast\\n\\n1365                                 sk-\u003esk_state = BT_CONFIG;\\n1366                         }\\n1367                         release_sock(sk);\\n1368                         return 0;\\n1369                 case BT_CONNECTED:\\n1370                         if (test_bit(BT_SK_PA_SYNC,\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.6.39\", \"versionStartIncluding\": \"6.6\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.9.9\", \"versionStartIncluding\": \"6.6\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.10\", \"versionStartIncluding\": \"6.6\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"6.5.12\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T12:57:46.234Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-42141\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T12:57:46.234Z\", \"dateReserved\": \"2024-07-29T15:50:41.189Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-07-30T07:46:35.174Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}