Skip to main content

CVE-2024-35965: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-35965cvecve-2024-35965
Published: Mon May 20 2024 (05/20/2024, 09:41:55 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix not validating setsockopt user input Check user input length before copying data.

AI-Powered Analysis

AILast updated: 06/29/2025, 08:40:33 UTC

Technical Analysis

CVE-2024-35965 is a vulnerability identified in the Linux kernel's Bluetooth L2CAP (Logical Link Control and Adaptation Protocol) implementation. The issue arises from improper validation of user input passed to the setsockopt system call, which is used to set options on sockets. Specifically, the kernel failed to verify the length of the user-supplied data before copying it, leading to a potential buffer overflow or memory corruption scenario. This vulnerability could allow a local or possibly remote attacker to craft malicious Bluetooth packets or socket options that exploit this flaw to execute arbitrary code, escalate privileges, or cause denial of service by crashing the kernel. The vulnerability affects multiple versions of the Linux kernel, as indicated by the repeated commit hashes, and was publicly disclosed on May 20, 2024. Although no known exploits are currently reported in the wild, the nature of the vulnerability—improper input validation in a widely used kernel subsystem—makes it a significant security concern. The lack of a CVSS score suggests that the severity has not yet been formally assessed, but the technical details imply a potentially high impact if exploited. The fix involves adding proper length checks before copying user input data, mitigating the risk of buffer overflows and related attacks.

Potential Impact

For European organizations, this vulnerability poses a considerable risk, especially those relying heavily on Linux-based systems with Bluetooth capabilities. Industries such as manufacturing, healthcare, telecommunications, and critical infrastructure often use Linux servers, embedded devices, and IoT systems that may utilize Bluetooth connectivity. Exploitation could lead to unauthorized system access, data breaches, or service disruptions. Given the kernel-level nature of the flaw, successful exploitation could compromise system integrity and availability, potentially affecting operational technology and sensitive data. Additionally, organizations with remote or mobile workforces using Bluetooth peripherals could be exposed to targeted attacks. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits following public disclosure. The vulnerability's impact is amplified in environments where patching is delayed or where Bluetooth is enabled by default without strict access controls.

Mitigation Recommendations

European organizations should prioritize applying the official Linux kernel patches that address this vulnerability as soon as they become available. Until patches are deployed, organizations should consider disabling Bluetooth functionality on critical systems where it is not essential, to reduce the attack surface. Network segmentation and strict access controls should be enforced to limit exposure of vulnerable systems. Monitoring for unusual Bluetooth activity and kernel crashes can help detect attempted exploitation. Additionally, organizations should review and harden Bluetooth security policies, including device pairing and authentication mechanisms. For embedded and IoT devices running vulnerable Linux kernels, vendors should be contacted for firmware updates or mitigations. Security teams should also update intrusion detection and prevention systems with signatures targeting potential exploitation attempts related to L2CAP setsockopt misuse. Finally, maintaining an up-to-date asset inventory to identify all Linux systems with Bluetooth enabled is critical for effective remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T13:50:33.138Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9828c4522896dcbe22f0

Added to database: 5/21/2025, 9:08:56 AM

Last enriched: 6/29/2025, 8:40:33 AM

Last updated: 7/28/2025, 4:24:15 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats