Impact
The vulnerability is a race condition within the Bluetooth HCI over UART driver; a TTY write wakeup can schedule work before the UART instance is fully set up, causing a null pointer dereference in hci_uart_write_work. This triggers a kernel crash, leading to system unavailability and a forced reboot.
Affected Systems
Linux kernel builds containing the hci_uart driver are affected, including the release candidates of version 6.19 (rc1 through rc7) as listed in the CPE data. Administrators running these kernel releases should verify whether the patch has been applied.
Risk and Exploitability
With a CVSS score of 5.5 the flaw is of medium severity, and the EPSS score below 1% indicates a very low likelihood of exploitation. It is not listed in the CISA KEV catalog. Exploitation requires a race between a TTY wakeup and driver initialization, typically needing local privileged access or an active UART interface. Workarounds are limited, making the safest approach to update to a patched kernel version.
OpenCVE Enrichment
Ubuntu USN