Skip to main content

CVE-2024-35964: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-35964cvecve-2024-35964
Published: Mon May 20 2024 (05/20/2024, 09:41:54 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ISO: Fix not validating setsockopt user input Check user input length before copying data.

AI-Powered Analysis

AILast updated: 06/29/2025, 08:40:24 UTC

Technical Analysis

CVE-2024-35964 is a vulnerability identified in the Linux kernel's Bluetooth ISO (Isochronous Channels) implementation. The issue arises from improper validation of user input passed to the setsockopt system call, which is used to set options on sockets. Specifically, the vulnerability involves a failure to check the length of user-supplied data before copying it, potentially leading to a buffer overflow or memory corruption scenario. This flaw could allow a local or potentially remote attacker with the ability to interact with the Bluetooth stack to craft malicious input that triggers the vulnerability. Exploitation could result in arbitrary code execution within the kernel context, privilege escalation, or denial of service due to kernel crashes. The vulnerability affects certain versions of the Linux kernel identified by specific commit hashes, indicating it is present in recent kernel builds prior to the patch. The issue was reserved on May 17, 2024, and published on May 20, 2024, with no known exploits in the wild at the time of reporting. The Linux project has addressed this by adding proper length validation checks before copying user input, mitigating the risk of memory corruption.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially for environments relying on Linux systems with Bluetooth capabilities, including enterprise servers, IoT devices, and endpoint workstations. Exploitation could lead to unauthorized kernel-level code execution, compromising system confidentiality, integrity, and availability. This could facilitate lateral movement within networks, data exfiltration, or disruption of critical services. Organizations in sectors such as manufacturing, healthcare, telecommunications, and critical infrastructure that utilize Linux-based systems with Bluetooth connectivity are particularly at risk. The lack of known exploits currently reduces immediate threat but the potential for future exploitation remains, especially as attackers often target kernel vulnerabilities for persistent access. Additionally, the Bluetooth vector increases the attack surface by enabling remote or local proximity-based attacks, which could bypass traditional network defenses.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to the latest patched versions that include the fix for CVE-2024-35964. System administrators must audit all Linux systems with Bluetooth enabled and apply kernel updates promptly. For environments where immediate patching is not feasible, disabling Bluetooth functionality or restricting access to Bluetooth interfaces can reduce exposure. Network segmentation and strict access controls should be enforced to limit the ability of attackers to reach vulnerable systems. Monitoring kernel logs and employing intrusion detection systems capable of identifying anomalous Bluetooth activity can provide early warning of exploitation attempts. Additionally, organizations should review and harden their Bluetooth security policies, including device pairing and authentication mechanisms, to minimize attack vectors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T13:50:33.138Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9828c4522896dcbe22e8

Added to database: 5/21/2025, 9:08:56 AM

Last enriched: 6/29/2025, 8:40:24 AM

Last updated: 7/27/2025, 2:24:14 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats