First published: Mon May 13 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout The Linux kernel CVE team has assigned <a href="https://access.redhat.com/security/cve/CVE-2024-27399">CVE-2024-27399</a> to this issue. Upstream advisory: <a href="https://lore.kernel.org/linux-cve-announce/2024051300-CVE-2024-27399-afa8@gregkh/T">https://lore.kernel.org/linux-cve-announce/2024051300-CVE-2024-27399-afa8@gregkh/T</a>
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.9 | 6.9 |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-27399 has been classified with a medium to high severity due to its potential to cause null pointer dereference in the Linux kernel Bluetooth stack.
To resolve CVE-2024-27399, users should update to the recommended kernel versions specified by their Linux distribution, such as Red Hat or Debian.
CVE-2024-27399 affects specific versions of the Linux kernel, including versions up to 6.9 in Red Hat and several versions in the Debian package management.
Currently, there is no widely recommended workaround for CVE-2024-27399; updating to the patched kernel versions is the best course of action.
CVE-2024-27399 specifically impacts the Bluetooth functionality within the Linux kernel, particularly related to L2CAP channel timeouts.