cve-2024-42137
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2024-12-19 09:13
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot Commit 272970be3dab ("Bluetooth: hci_qca: Fix driver shutdown on closed serdev") will cause below regression issue: BT can't be enabled after below steps: cold boot -> enable BT -> disable BT -> warm reboot -> BT enable failure if property enable-gpios is not configured within DT|ACPI for QCA6390. The commit is to fix a use-after-free issue within qca_serdev_shutdown() by adding condition to avoid the serdev is flushed or wrote after closed but also introduces this regression issue regarding above steps since the VSC is not sent to reset controller during warm reboot. Fixed by sending the VSC to reset controller within qca_serdev_shutdown() once BT was ever enabled, and the use-after-free issue is also fixed by this change since the serdev is still opened before it is flushed or wrote. Verified by the reported machine Dell XPS 13 9310 laptop over below two kernel commits: commit e00fc2700a3f ("Bluetooth: btusb: Fix triggering coredump implementation for QCA") of bluetooth-next tree. commit b23d98d46d28 ("Bluetooth: btusb: Fix triggering coredump implementation for QCA") of linus mainline tree.
Impacted products
Vendor Product Version
Linux Linux Version: e84ec6e25df9bb0968599e92eacedaf3a0a5b587
Version: 908d1742b6e694e84ead5c62e4b7c1bfbb8b46a3
Version: ea3ebda47dd56f6e1c62f2e0e1b6e1b0a973e447
Version: 272970be3dabd24cbe50e393ffee8f04aec3b9a8
Version: 272970be3dabd24cbe50e393ffee8f04aec3b9a8
Version: 272970be3dabd24cbe50e393ffee8f04aec3b9a8
Create a notification for this product.
   Linux Linux Version: 6.2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T04:54:32.549Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/215a26c2404fa34625c725d446967fa328a703eb",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/4ca6013cd18e58ac1044908c40d4006a92093a11",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/e6e200b264271f62a3fadb51ada9423015ece37b",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/e2d8aa4c763593704ac21e7591aed4f13e32f3b5",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/977b9dc65e14fb80de4763d949c7dec2ecb15b9b",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/88e72239ead9814b886db54fc4ee39ef3c2b8f26",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-42137",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-09-10T16:16:06.425192Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-11T17:34:35.827Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Linux",
               programFiles: [
                  "drivers/bluetooth/hci_qca.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     lessThan: "215a26c2404fa34625c725d446967fa328a703eb",
                     status: "affected",
                     version: "e84ec6e25df9bb0968599e92eacedaf3a0a5b587",
                     versionType: "git",
                  },
                  {
                     lessThan: "4ca6013cd18e58ac1044908c40d4006a92093a11",
                     status: "affected",
                     version: "908d1742b6e694e84ead5c62e4b7c1bfbb8b46a3",
                     versionType: "git",
                  },
                  {
                     lessThan: "e6e200b264271f62a3fadb51ada9423015ece37b",
                     status: "affected",
                     version: "ea3ebda47dd56f6e1c62f2e0e1b6e1b0a973e447",
                     versionType: "git",
                  },
                  {
                     lessThan: "e2d8aa4c763593704ac21e7591aed4f13e32f3b5",
                     status: "affected",
                     version: "272970be3dabd24cbe50e393ffee8f04aec3b9a8",
                     versionType: "git",
                  },
                  {
                     lessThan: "977b9dc65e14fb80de4763d949c7dec2ecb15b9b",
                     status: "affected",
                     version: "272970be3dabd24cbe50e393ffee8f04aec3b9a8",
                     versionType: "git",
                  },
                  {
                     lessThan: "88e72239ead9814b886db54fc4ee39ef3c2b8f26",
                     status: "affected",
                     version: "272970be3dabd24cbe50e393ffee8f04aec3b9a8",
                     versionType: "git",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "Linux",
               programFiles: [
                  "drivers/bluetooth/hci_qca.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     status: "affected",
                     version: "6.2",
                  },
                  {
                     lessThan: "6.2",
                     status: "unaffected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.10.*",
                     status: "unaffected",
                     version: "5.10.222",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.15.*",
                     status: "unaffected",
                     version: "5.15.163",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.1.*",
                     status: "unaffected",
                     version: "6.1.98",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.6.*",
                     status: "unaffected",
                     version: "6.6.39",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.9.*",
                     status: "unaffected",
                     version: "6.9.9",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "*",
                     status: "unaffected",
                     version: "6.10",
                     versionType: "original_commit_for_fix",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot\n\nCommit 272970be3dab (\"Bluetooth: hci_qca: Fix driver shutdown on closed\nserdev\") will cause below regression issue:\n\nBT can't be enabled after below steps:\ncold boot -> enable BT -> disable BT -> warm reboot -> BT enable failure\nif property enable-gpios is not configured within DT|ACPI for QCA6390.\n\nThe commit is to fix a use-after-free issue within qca_serdev_shutdown()\nby adding condition to avoid the serdev is flushed or wrote after closed\nbut also introduces this regression issue regarding above steps since the\nVSC is not sent to reset controller during warm reboot.\n\nFixed by sending the VSC to reset controller within qca_serdev_shutdown()\nonce BT was ever enabled, and the use-after-free issue is also fixed by\nthis change since the serdev is still opened before it is flushed or wrote.\n\nVerified by the reported machine Dell XPS 13 9310 laptop over below two\nkernel commits:\ncommit e00fc2700a3f (\"Bluetooth: btusb: Fix triggering coredump\nimplementation for QCA\") of bluetooth-next tree.\ncommit b23d98d46d28 (\"Bluetooth: btusb: Fix triggering coredump\nimplementation for QCA\") of linus mainline tree.",
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-19T09:13:51.055Z",
            orgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
            shortName: "Linux",
         },
         references: [
            {
               url: "https://git.kernel.org/stable/c/215a26c2404fa34625c725d446967fa328a703eb",
            },
            {
               url: "https://git.kernel.org/stable/c/4ca6013cd18e58ac1044908c40d4006a92093a11",
            },
            {
               url: "https://git.kernel.org/stable/c/e6e200b264271f62a3fadb51ada9423015ece37b",
            },
            {
               url: "https://git.kernel.org/stable/c/e2d8aa4c763593704ac21e7591aed4f13e32f3b5",
            },
            {
               url: "https://git.kernel.org/stable/c/977b9dc65e14fb80de4763d949c7dec2ecb15b9b",
            },
            {
               url: "https://git.kernel.org/stable/c/88e72239ead9814b886db54fc4ee39ef3c2b8f26",
            },
         ],
         title: "Bluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot",
         x_generator: {
            engine: "bippy-5f407fcff5a0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      assignerShortName: "Linux",
      cveId: "CVE-2024-42137",
      datePublished: "2024-07-30T07:46:31.748Z",
      dateReserved: "2024-07-29T15:50:41.188Z",
      dateUpdated: "2024-12-19T09:13:51.055Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2024-42137\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-07-30T08:15:05.583\",\"lastModified\":\"2024-11-21T09:33:40.817\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nBluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot\\n\\nCommit 272970be3dab (\\\"Bluetooth: hci_qca: Fix driver shutdown on closed\\nserdev\\\") will cause below regression issue:\\n\\nBT can't be enabled after below steps:\\ncold boot -> enable BT -> disable BT -> warm reboot -> BT enable failure\\nif property enable-gpios is not configured within DT|ACPI for QCA6390.\\n\\nThe commit is to fix a use-after-free issue within qca_serdev_shutdown()\\nby adding condition to avoid the serdev is flushed or wrote after closed\\nbut also introduces this regression issue regarding above steps since the\\nVSC is not sent to reset controller during warm reboot.\\n\\nFixed by sending the VSC to reset controller within qca_serdev_shutdown()\\nonce BT was ever enabled, and the use-after-free issue is also fixed by\\nthis change since the serdev is still opened before it is flushed or wrote.\\n\\nVerified by the reported machine Dell XPS 13 9310 laptop over below two\\nkernel commits:\\ncommit e00fc2700a3f (\\\"Bluetooth: btusb: Fix triggering coredump\\nimplementation for QCA\\\") of bluetooth-next tree.\\ncommit b23d98d46d28 (\\\"Bluetooth: btusb: Fix triggering coredump\\nimplementation for QCA\\\") of linus mainline tree.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvió la siguiente vulnerabilidad: Bluetooth: qca: corrija el error de habilitación de BT nuevamente para QCA6390 después de un reinicio en caliente. La confirmación 272970be3dab (\\\"Bluetooth: hci_qca: corrija el apagado del controlador en un serdev cerrado\\\") causará el siguiente problema de regresión: BT puede No se habilitará después de los pasos siguientes: arranque en frío -> habilitar BT -> deshabilitar BT -> reinicio en caliente -> falla de habilitación de BT si la propiedad enable-gpios no está configurada dentro de DT|ACPI para QCA6390. El compromiso es solucionar un problema de use after free dentro de qca_serdev_shutdown() agregando una condición para evitar que el serdev se vacíe o escriba después de cerrarse, pero también introduce este problema de regresión con respecto a los pasos anteriores, ya que el VSC no se envía para restablecer el controlador durante el reinicio en caliente. . Se solucionó enviando el VSC para restablecer el controlador dentro de qca_serdev_shutdown() una vez que BT estuvo habilitado, y el problema de use after free también se solucionó con este cambio ya que el serdev todavía está abierto antes de vaciarse o escribirse. Verificado por la computadora portátil Dell XPS 13 9310 de la máquina informada en las siguientes dos confirmaciones del kernel: confirmación e00fc2700a3f (\\\"Bluetooth: btusb: solución de activación de la implementación de coredump para QCA\\\") del árbol siguiente de bluetooth. confirme b23d98d46d28 (\\\"Bluetooth: btusb: solución que activa la implementación de coredump para QCA\\\") del árbol principal de Linux.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.10.165\",\"versionEndExcluding\":\"5.10.222\",\"matchCriteriaId\":\"CF05EAFA-9345-4303-8E4A-118C81B5FDC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.15.90\",\"versionEndExcluding\":\"5.15.163\",\"matchCriteriaId\":\"F190A745-DE5B-4FA4-B504-04D029449519\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.1.8\",\"versionEndExcluding\":\"6.1.98\",\"matchCriteriaId\":\"7D6B9E05-F2EB-4D2B-94B9-4CB17D7D13C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.39\",\"matchCriteriaId\":\"29E894E4-668F-4DB0-81F7-4FB5F698E970\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.9.9\",\"matchCriteriaId\":\"ADCC1407-0CB3-4C8F-B4C5-07F682CD7085\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EBB4392-5FA6-4DA9-9772-8F9C750109FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"331C2F14-12C7-45D5-893D-8C52EE38EA10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"3173713D-909A-4DD3-9DD4-1E171EB057EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"79F18AFA-40F7-43F0-BA30-7BDB65F918B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD973AA4-A789-49BD-8D57-B2846935D3C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F3E9E0C-AC3E-4967-AF80-6483E8AB0078\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/215a26c2404fa34625c725d446967fa328a703eb\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/4ca6013cd18e58ac1044908c40d4006a92093a11\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/88e72239ead9814b886db54fc4ee39ef3c2b8f26\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/977b9dc65e14fb80de4763d949c7dec2ecb15b9b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e2d8aa4c763593704ac21e7591aed4f13e32f3b5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e6e200b264271f62a3fadb51ada9423015ece37b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/215a26c2404fa34625c725d446967fa328a703eb\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/4ca6013cd18e58ac1044908c40d4006a92093a11\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/88e72239ead9814b886db54fc4ee39ef3c2b8f26\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/977b9dc65e14fb80de4763d949c7dec2ecb15b9b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e2d8aa4c763593704ac21e7591aed4f13e32f3b5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e6e200b264271f62a3fadb51ada9423015ece37b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
      vulnrichment: {
         containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/215a26c2404fa34625c725d446967fa328a703eb\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/4ca6013cd18e58ac1044908c40d4006a92093a11\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/e6e200b264271f62a3fadb51ada9423015ece37b\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/e2d8aa4c763593704ac21e7591aed4f13e32f3b5\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/977b9dc65e14fb80de4763d949c7dec2ecb15b9b\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/88e72239ead9814b886db54fc4ee39ef3c2b8f26\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T04:54:32.549Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-42137\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T16:16:06.425192Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:24.671Z\"}}], \"cna\": {\"title\": \"Bluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"e84ec6e25df9bb0968599e92eacedaf3a0a5b587\", \"lessThan\": \"215a26c2404fa34625c725d446967fa328a703eb\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"908d1742b6e694e84ead5c62e4b7c1bfbb8b46a3\", \"lessThan\": \"4ca6013cd18e58ac1044908c40d4006a92093a11\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"ea3ebda47dd56f6e1c62f2e0e1b6e1b0a973e447\", \"lessThan\": \"e6e200b264271f62a3fadb51ada9423015ece37b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"272970be3dabd24cbe50e393ffee8f04aec3b9a8\", \"lessThan\": \"e2d8aa4c763593704ac21e7591aed4f13e32f3b5\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"272970be3dabd24cbe50e393ffee8f04aec3b9a8\", \"lessThan\": \"977b9dc65e14fb80de4763d949c7dec2ecb15b9b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"272970be3dabd24cbe50e393ffee8f04aec3b9a8\", \"lessThan\": \"88e72239ead9814b886db54fc4ee39ef3c2b8f26\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/bluetooth/hci_qca.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.2\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"6.2\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.10.222\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.163\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.98\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.39\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.9.9\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.9.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/bluetooth/hci_qca.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/215a26c2404fa34625c725d446967fa328a703eb\"}, {\"url\": \"https://git.kernel.org/stable/c/4ca6013cd18e58ac1044908c40d4006a92093a11\"}, {\"url\": \"https://git.kernel.org/stable/c/e6e200b264271f62a3fadb51ada9423015ece37b\"}, {\"url\": \"https://git.kernel.org/stable/c/e2d8aa4c763593704ac21e7591aed4f13e32f3b5\"}, {\"url\": \"https://git.kernel.org/stable/c/977b9dc65e14fb80de4763d949c7dec2ecb15b9b\"}, {\"url\": \"https://git.kernel.org/stable/c/88e72239ead9814b886db54fc4ee39ef3c2b8f26\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nBluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot\\n\\nCommit 272970be3dab (\\\"Bluetooth: hci_qca: Fix driver shutdown on closed\\nserdev\\\") will cause below regression issue:\\n\\nBT can't be enabled after below steps:\\ncold boot -> enable BT -> disable BT -> warm reboot -> BT enable failure\\nif property enable-gpios is not configured within DT|ACPI for QCA6390.\\n\\nThe commit is to fix a use-after-free issue within qca_serdev_shutdown()\\nby adding condition to avoid the serdev is flushed or wrote after closed\\nbut also introduces this regression issue regarding above steps since the\\nVSC is not sent to reset controller during warm reboot.\\n\\nFixed by sending the VSC to reset controller within qca_serdev_shutdown()\\nonce BT was ever enabled, and the use-after-free issue is also fixed by\\nthis change since the serdev is still opened before it is flushed or wrote.\\n\\nVerified by the reported machine Dell XPS 13 9310 laptop over below two\\nkernel commits:\\ncommit e00fc2700a3f (\\\"Bluetooth: btusb: Fix triggering coredump\\nimplementation for QCA\\\") of bluetooth-next tree.\\ncommit b23d98d46d28 (\\\"Bluetooth: btusb: Fix triggering coredump\\nimplementation for QCA\\\") of linus mainline tree.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-12-19T09:13:51.055Z\"}}}",
         cveMetadata: "{\"cveId\": \"CVE-2024-42137\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-19T09:13:51.055Z\", \"dateReserved\": \"2024-07-29T15:50:41.188Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-07-30T07:46:31.748Z\", \"assignerShortName\": \"Linux\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.