First published: Mon Feb 05 2024(Updated: )
A race condition was found in the Linux kernel's net/bluetooth in {conn,adv}_{min,max}_interval_set() function. This can result in I2cap connection or broadcast abnormality issue, possibly leading to denial of service.
Credit: security@openanolis.org security@openanolis.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 6.12.11-1 | |
Linux Kernel | <=3.19.8 | |
Linux Kernel | >=6.0<=6.7.2 | |
Linux Kernel | =6.8-rc1 |
https://lore.kernel.org/lkml/20231222161317.6255-1-2045gemini@gmail.com/ https://lore.kernel.org/lkml/20231222161317.6255-1-2045gemini@gmail.com/
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24858 is classified as a denial of service vulnerability due to a race condition in the Linux kernel.
To mitigate CVE-2024-24858, update your Linux kernel to versions 5.10.223-1, 6.1.123-1, or higher that are not affected by this vulnerability.
CVE-2024-24858 affects various versions of the Linux kernel including versions up to 3.19.8 and specific versions between 6.0 and 6.7.2.
Exploitation of CVE-2024-24858 can lead to I2cap connection disruptions or broadcast abnormalities, potentially resulting in denial of service.
Currently, the best practice for CVE-2024-24858 is to apply the latest kernel updates as there are no specific workarounds available.