Skip to main content

CVE-2024-35851: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-35851cvecve-2024-35851
Published: Fri May 17 2024 (05/17/2024, 14:47:28 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: qca: fix NULL-deref on non-serdev suspend Qualcomm ROME controllers can be registered from the Bluetooth line discipline and in this case the HCI UART serdev pointer is NULL. Add the missing sanity check to prevent a NULL-pointer dereference when wakeup() is called for a non-serdev controller during suspend. Just return true for now to restore the original behaviour and address the crash with pre-6.2 kernels, which do not have commit e9b3e5b8c657 ("Bluetooth: hci_qca: only assign wakeup with serial port support") that causes the crash to happen already at setup() time.

AI-Powered Analysis

AILast updated: 06/29/2025, 16:40:35 UTC

Technical Analysis

CVE-2024-35851 is a vulnerability identified in the Linux kernel's Bluetooth subsystem, specifically affecting Qualcomm ROME Bluetooth controllers. The issue arises from a missing sanity check that leads to a NULL-pointer dereference during the suspend operation of certain Bluetooth devices. Qualcomm ROME controllers can be registered via the Bluetooth line discipline, but in this case, the HCI UART serdev pointer is NULL. When the wakeup() function is called on a non-serdev controller during system suspend, the absence of a NULL-pointer check causes the kernel to dereference a NULL pointer, resulting in a crash. This vulnerability affects Linux kernel versions prior to 6.2 that do not include the commit e9b3e5b8c657, which introduced a fix by assigning wakeup only with serial port support. The patch for this vulnerability restores the original behavior by returning true early in the wakeup() function to prevent the crash. Although this vulnerability causes a denial of service (DoS) condition through kernel crashes, it does not appear to allow privilege escalation or remote code execution. No known exploits are currently reported in the wild. The vulnerability is rooted in kernel-level Bluetooth driver code, which is critical for device connectivity and system stability.

Potential Impact

For European organizations, this vulnerability primarily poses a risk of system instability and denial of service on Linux-based systems utilizing affected Qualcomm ROME Bluetooth controllers. Organizations relying on Linux servers, workstations, or embedded devices with Bluetooth capabilities may experience unexpected kernel crashes during suspend operations, potentially leading to service interruptions or loss of availability. This could affect sectors where Linux is widely deployed, including telecommunications, manufacturing, and critical infrastructure. Although the vulnerability does not currently enable remote code execution or data compromise, repeated crashes could disrupt business operations and impact user productivity. Additionally, environments with strict uptime requirements or those using Bluetooth for critical communications may face operational challenges. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or targeted triggering of the crash condition.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize updating their Linux kernel to version 6.2 or later, which includes the fix for this issue. For systems where immediate kernel upgrades are not feasible, applying backported patches from trusted Linux distribution vendors is recommended. Organizations should audit their Linux systems to identify the presence of Qualcomm ROME Bluetooth controllers and assess whether the affected Bluetooth line discipline is in use. Disabling Bluetooth functionality temporarily on critical systems where it is not required can reduce exposure. Additionally, monitoring system logs for kernel crashes related to Bluetooth suspend operations can help detect attempts to trigger this vulnerability. For embedded or specialized devices, coordination with hardware vendors to obtain firmware or driver updates is essential. Implementing robust system backup and recovery procedures will also help minimize operational impact in case of crashes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T13:50:33.105Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ac4522896dcbe3649

Added to database: 5/21/2025, 9:08:58 AM

Last enriched: 6/29/2025, 4:40:35 PM

Last updated: 7/31/2025, 6:18:41 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats