CVE-2024-35850: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: qca: fix NULL-deref on non-serdev setup Qualcomm ROME controllers can be registered from the Bluetooth line discipline and in this case the HCI UART serdev pointer is NULL. Add the missing sanity check to prevent a NULL-pointer dereference when setup() is called for a non-serdev controller.
AI Analysis
Technical Summary
CVE-2024-35850 is a vulnerability identified in the Linux kernel's Bluetooth subsystem, specifically related to Qualcomm ROME Bluetooth controllers. The issue arises when these controllers are registered via the Bluetooth line discipline, where the Host Controller Interface (HCI) UART serdev pointer can be NULL. The vulnerability is a NULL-pointer dereference caused by the absence of a sanity check in the setup() function for non-serdev controllers. When the setup() function is called without verifying that the serdev pointer is non-NULL, it leads to a NULL-pointer dereference, which typically results in a kernel crash (kernel panic) or system instability. This flaw is a classic example of improper input validation and error handling in kernel code. The vulnerability affects certain Linux kernel versions identified by the commit hash e9b3e5b8c65733f626a7ee919c4bc895b51d7bb2. Although no known exploits are currently reported in the wild, the flaw could be triggered by an attacker with the ability to interact with the Bluetooth subsystem, potentially causing denial of service (DoS) through system crashes. Since the issue is in the kernel Bluetooth driver for Qualcomm ROME controllers, it specifically impacts systems using these controllers and running vulnerable Linux kernel versions. The fix involves adding a missing sanity check to prevent the NULL-pointer dereference, thereby improving the robustness of the Bluetooth driver code.
Potential Impact
For European organizations, the primary impact of CVE-2024-35850 is the potential for denial of service attacks on Linux systems utilizing Qualcomm ROME Bluetooth controllers. This could lead to unexpected system crashes or reboots, disrupting business operations, especially in environments where Bluetooth connectivity is critical (e.g., IoT deployments, industrial control systems, or enterprise laptops and mobile devices). Confidentiality and integrity impacts are minimal since the vulnerability does not directly allow code execution or privilege escalation. However, availability is affected due to the risk of kernel panics. Organizations relying on Linux-based infrastructure with Bluetooth capabilities may experience operational downtime, which could affect productivity and service availability. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to prevent potential future exploitation. Additionally, embedded systems and devices in sectors such as manufacturing, healthcare, and transportation that use Linux with Qualcomm Bluetooth hardware could be vulnerable to targeted disruption.
Mitigation Recommendations
To mitigate CVE-2024-35850, organizations should: 1) Identify Linux systems running vulnerable kernel versions, particularly those using Qualcomm ROME Bluetooth controllers. 2) Apply the official Linux kernel patches that add the missing sanity check to the Bluetooth driver code as soon as they become available. 3) If patching is not immediately possible, consider disabling Bluetooth functionality on affected systems to prevent triggering the vulnerability. 4) Monitor system logs for unusual Bluetooth-related errors or kernel panics that could indicate attempts to exploit this flaw. 5) Implement network segmentation and access controls to limit exposure of vulnerable systems to untrusted Bluetooth devices or networks. 6) Maintain up-to-date asset inventories to quickly identify affected devices and prioritize patching efforts. 7) Engage with hardware vendors to confirm the presence of Qualcomm ROME controllers and obtain vendor-specific guidance or firmware updates if applicable.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2024-35850: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: qca: fix NULL-deref on non-serdev setup Qualcomm ROME controllers can be registered from the Bluetooth line discipline and in this case the HCI UART serdev pointer is NULL. Add the missing sanity check to prevent a NULL-pointer dereference when setup() is called for a non-serdev controller.
AI-Powered Analysis
Technical Analysis
CVE-2024-35850 is a vulnerability identified in the Linux kernel's Bluetooth subsystem, specifically related to Qualcomm ROME Bluetooth controllers. The issue arises when these controllers are registered via the Bluetooth line discipline, where the Host Controller Interface (HCI) UART serdev pointer can be NULL. The vulnerability is a NULL-pointer dereference caused by the absence of a sanity check in the setup() function for non-serdev controllers. When the setup() function is called without verifying that the serdev pointer is non-NULL, it leads to a NULL-pointer dereference, which typically results in a kernel crash (kernel panic) or system instability. This flaw is a classic example of improper input validation and error handling in kernel code. The vulnerability affects certain Linux kernel versions identified by the commit hash e9b3e5b8c65733f626a7ee919c4bc895b51d7bb2. Although no known exploits are currently reported in the wild, the flaw could be triggered by an attacker with the ability to interact with the Bluetooth subsystem, potentially causing denial of service (DoS) through system crashes. Since the issue is in the kernel Bluetooth driver for Qualcomm ROME controllers, it specifically impacts systems using these controllers and running vulnerable Linux kernel versions. The fix involves adding a missing sanity check to prevent the NULL-pointer dereference, thereby improving the robustness of the Bluetooth driver code.
Potential Impact
For European organizations, the primary impact of CVE-2024-35850 is the potential for denial of service attacks on Linux systems utilizing Qualcomm ROME Bluetooth controllers. This could lead to unexpected system crashes or reboots, disrupting business operations, especially in environments where Bluetooth connectivity is critical (e.g., IoT deployments, industrial control systems, or enterprise laptops and mobile devices). Confidentiality and integrity impacts are minimal since the vulnerability does not directly allow code execution or privilege escalation. However, availability is affected due to the risk of kernel panics. Organizations relying on Linux-based infrastructure with Bluetooth capabilities may experience operational downtime, which could affect productivity and service availability. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to prevent potential future exploitation. Additionally, embedded systems and devices in sectors such as manufacturing, healthcare, and transportation that use Linux with Qualcomm Bluetooth hardware could be vulnerable to targeted disruption.
Mitigation Recommendations
To mitigate CVE-2024-35850, organizations should: 1) Identify Linux systems running vulnerable kernel versions, particularly those using Qualcomm ROME Bluetooth controllers. 2) Apply the official Linux kernel patches that add the missing sanity check to the Bluetooth driver code as soon as they become available. 3) If patching is not immediately possible, consider disabling Bluetooth functionality on affected systems to prevent triggering the vulnerability. 4) Monitor system logs for unusual Bluetooth-related errors or kernel panics that could indicate attempts to exploit this flaw. 5) Implement network segmentation and access controls to limit exposure of vulnerable systems to untrusted Bluetooth devices or networks. 6) Maintain up-to-date asset inventories to quickly identify affected devices and prioritize patching efforts. 7) Engage with hardware vendors to confirm the presence of Qualcomm ROME controllers and obtain vendor-specific guidance or firmware updates if applicable.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-17T13:50:33.105Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982ac4522896dcbe3645
Added to database: 5/21/2025, 9:08:58 AM
Last enriched: 6/29/2025, 4:40:11 PM
Last updated: 7/31/2025, 1:56:46 PM
Views: 10
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.