Skip to main content

CVE-2024-36032: Vulnerability in Linux Linux

Low
VulnerabilityCVE-2024-36032cvecve-2024-36032
Published: Thu May 30 2024 (05/30/2024, 15:23:47 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: qca: fix info leak when fetching fw build id Add the missing sanity checks and move the 255-byte build-id buffer off the stack to avoid leaking stack data through debugfs in case the build-info reply is malformed.

AI-Powered Analysis

AILast updated: 06/29/2025, 09:27:48 UTC

Technical Analysis

CVE-2024-36032 is a vulnerability identified in the Linux kernel's Bluetooth subsystem, specifically related to the Qualcomm Atheros (qca) driver. The issue involves an information leak caused by improper handling of the firmware build ID retrieval process. The vulnerability arises because the code lacked necessary sanity checks and stored a 255-byte build ID buffer on the stack. When the build-info reply from the firmware is malformed, this flaw can lead to leakage of stack data through the debugfs interface. This means that sensitive kernel stack memory contents could be exposed to an attacker with appropriate privileges. The vulnerability was addressed by adding the missing sanity checks and relocating the build ID buffer off the stack to prevent unintended data exposure. The CVSS v3.1 base score is 2.3, indicating a low severity level. The attack vector is local (AV:L), requiring low attack complexity (AC:L) but high privileges (PR:H) and no user interaction (UI:N). The impact is limited to confidentiality (C:L) with no impact on integrity or availability. No known exploits are currently reported in the wild. The vulnerability affects specific Linux kernel versions identified by commit hashes, and the fix has been published as of May 30, 2024.

Potential Impact

For European organizations, the impact of CVE-2024-36032 is relatively low due to its limited scope and the requirement for high privileges to exploit. The vulnerability could potentially allow a local attacker with elevated privileges to leak sensitive kernel stack data, which might aid in further attacks such as privilege escalation or information gathering. However, since the attack requires local access and high privileges, the risk to most enterprise environments is minimal unless an attacker has already compromised a system to some extent. Organizations running Linux systems with Bluetooth enabled and using affected Qualcomm Atheros drivers should be aware of this vulnerability. In environments where sensitive data confidentiality is critical, even low-level leaks can be concerning. Additionally, systems exposed to untrusted users with local access (e.g., multi-user servers, shared workstations) could be at slightly higher risk. Overall, the vulnerability does not directly affect system integrity or availability, so operational disruption is unlikely.

Mitigation Recommendations

To mitigate CVE-2024-36032, European organizations should promptly apply the Linux kernel patches that address this vulnerability. Specifically, updating to the latest stable kernel versions that include the fix is essential. Since the vulnerability involves the Bluetooth qca driver, organizations should audit their systems to identify if this driver is in use and whether Bluetooth functionality is enabled. If Bluetooth is not required, disabling it at the kernel or hardware level can reduce the attack surface. For systems where Bluetooth is necessary, ensure strict access controls to prevent unauthorized local access, and monitor for unusual activity that might indicate attempts to exploit kernel vulnerabilities. Additionally, organizations should maintain robust privilege management policies to limit the number of users with high privileges, reducing the risk of local exploitation. Regular vulnerability scanning and compliance checks can help verify that systems are patched and configured securely.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T13:50:33.160Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9828c4522896dcbe2505

Added to database: 5/21/2025, 9:08:56 AM

Last enriched: 6/29/2025, 9:27:48 AM

Last updated: 8/16/2025, 2:23:24 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats