First published: Mon Jan 06 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btusb: mediatek: add intf release flow when usb disconnect MediaTek claim an special usb intr interface for ISO data transmission. The interface need to be released before unregistering hci device when usb disconnect. Removing BT usb dongle without properly releasing the interface may cause Kernel panic while unregister hci device.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <6.12.8 | |
debian/linux | <=5.10.223-1<=5.10.234-1<=6.1.129-1<=6.1.128-1 | 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-56757 has a moderate severity rating due to its potential impact on the stability of Bluetooth connections in Linux.
To address CVE-2024-56757, update your Linux kernel to version 6.12.10-1 or 6.12.11-1, or apply vendor-specific patches if using Debian.
As of now, there are no confirmed reports of active exploitation of CVE-2024-56757 in the wild.
CVE-2024-56757 affects Linux kernel versions prior to 6.12.10 and specific Debian Linux packages between certain versions.
The consequences of CVE-2024-56757 may include instability in Bluetooth functionality and possible crashes when handling USB disconnected events.