First published: Mon Feb 05 2024(Updated: )
A race condition was found in the Linux kernel's net/bluetooth in sniff_{min,max}_interval_set() function. This can result in a bluetooth sniffing exception issue, possibly leading denial of service.
Credit: security@openanolis.org security@openanolis.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.8 | 6.8 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 6.12.11-1 | |
Linux Kernel | <=3.19.8 | |
Linux Kernel | >=6.0<=6.7.2 | |
Linux Kernel | =6.8-rc1 |
https://lore.kernel.org/lkml/20231222162931.6553-1-2045gemini@gmail.com/ https://lore.kernel.org/lkml/20231222162931.6553-1-2045gemini@gmail.com/
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24859 has been classified as a denial of service vulnerability in the Linux kernel's Bluetooth module.
To mitigate CVE-2024-24859, update the kernel to versions 6.8, 6.12.10-1, 6.12.11-1 or to the patched versions available in your distribution's repositories.
CVE-2024-24859 affects various Linux kernel versions, specifically those under 6.8 and including certain Debian and Red Hat kernel versions.
CVE-2024-24859 is related to the sniff_{min,max}_interval_set() function in the Linux kernel's Bluetooth module.
Yes, CVE-2024-24859 could lead to denial of service conditions if exploited, affecting the stability of Bluetooth operations.