Skip to main content

CVE-2024-49950: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-49950cvecve-2024-49950
Published: Mon Oct 21 2024 (10/21/2024, 18:02:06 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix uaf in l2cap_connect [Syzbot reported] BUG: KASAN: slab-use-after-free in l2cap_connect.constprop.0+0x10d8/0x1270 net/bluetooth/l2cap_core.c:3949 Read of size 8 at addr ffff8880241e9800 by task kworker/u9:0/54 CPU: 0 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.11.0-rc6-syzkaller-00268-g788220eee30d #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Workqueue: hci2 hci_rx_work Call Trace: <TASK> __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:119 print_address_description mm/kasan/report.c:377 [inline] print_report+0xc3/0x620 mm/kasan/report.c:488 kasan_report+0xd9/0x110 mm/kasan/report.c:601 l2cap_connect.constprop.0+0x10d8/0x1270 net/bluetooth/l2cap_core.c:3949 l2cap_connect_req net/bluetooth/l2cap_core.c:4080 [inline] l2cap_bredr_sig_cmd net/bluetooth/l2cap_core.c:4772 [inline] l2cap_sig_channel net/bluetooth/l2cap_core.c:5543 [inline] l2cap_recv_frame+0xf0b/0x8eb0 net/bluetooth/l2cap_core.c:6825 l2cap_recv_acldata+0x9b4/0xb70 net/bluetooth/l2cap_core.c:7514 hci_acldata_packet net/bluetooth/hci_core.c:3791 [inline] hci_rx_work+0xaab/0x1610 net/bluetooth/hci_core.c:4028 process_one_work+0x9c5/0x1b40 kernel/workqueue.c:3231 process_scheduled_works kernel/workqueue.c:3312 [inline] worker_thread+0x6c8/0xed0 kernel/workqueue.c:3389 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 ... Freed by task 5245: kasan_save_stack+0x33/0x60 mm/kasan/common.c:47 kasan_save_track+0x14/0x30 mm/kasan/common.c:68 kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:579 poison_slab_object+0xf7/0x160 mm/kasan/common.c:240 __kasan_slab_free+0x32/0x50 mm/kasan/common.c:256 kasan_slab_free include/linux/kasan.h:184 [inline] slab_free_hook mm/slub.c:2256 [inline] slab_free mm/slub.c:4477 [inline] kfree+0x12a/0x3b0 mm/slub.c:4598 l2cap_conn_free net/bluetooth/l2cap_core.c:1810 [inline] kref_put include/linux/kref.h:65 [inline] l2cap_conn_put net/bluetooth/l2cap_core.c:1822 [inline] l2cap_conn_del+0x59d/0x730 net/bluetooth/l2cap_core.c:1802 l2cap_connect_cfm+0x9e6/0xf80 net/bluetooth/l2cap_core.c:7241 hci_connect_cfm include/net/bluetooth/hci_core.h:1960 [inline] hci_conn_failed+0x1c3/0x370 net/bluetooth/hci_conn.c:1265 hci_abort_conn_sync+0x75a/0xb50 net/bluetooth/hci_sync.c:5583 abort_conn_sync+0x197/0x360 net/bluetooth/hci_conn.c:2917 hci_cmd_sync_work+0x1a4/0x410 net/bluetooth/hci_sync.c:328 process_one_work+0x9c5/0x1b40 kernel/workqueue.c:3231 process_scheduled_works kernel/workqueue.c:3312 [inline] worker_thread+0x6c8/0xed0 kernel/workqueue.c:3389 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

AI-Powered Analysis

AILast updated: 06/28/2025, 15:26:56 UTC

Technical Analysis

CVE-2024-49950 is a use-after-free (UAF) vulnerability identified in the Linux kernel's Bluetooth subsystem, specifically within the L2CAP (Logical Link Control and Adaptation Protocol) layer. The vulnerability arises in the l2cap_connect function, which handles connection establishment for Bluetooth L2CAP channels. The issue was detected by Syzbot, an automated kernel fuzzer, and involves a slab-use-after-free condition triggered during the processing of L2CAP connection requests. The kernel's Kernel Address Sanitizer (KASAN) detected a read of freed memory, indicating that a pointer to a previously freed object was accessed, leading to undefined behavior. The call trace shows that the flaw occurs during the handling of Bluetooth signaling commands and connection confirmation routines, involving functions such as l2cap_connect_req, l2cap_bredr_sig_cmd, and l2cap_connect_cfm. The vulnerability could be exploited by an attacker capable of sending crafted Bluetooth packets to a vulnerable Linux system, potentially causing memory corruption. This could lead to kernel crashes (denial of service) or, in a worst-case scenario, privilege escalation or arbitrary code execution within the kernel context. The affected versions correspond to recent Linux kernel commits prior to the fix, including kernel version 6.11.0-rc6 and similar. No CVSS score has been assigned yet, and no known exploits are reported in the wild at this time. The vulnerability is critical because it affects the kernel's Bluetooth stack, a core component responsible for wireless communication, and use-after-free bugs are often exploitable for privilege escalation or system compromise.

Potential Impact

For European organizations, the impact of CVE-2024-49950 could be significant, especially for those relying on Linux-based systems with Bluetooth enabled. This includes enterprises using Linux servers, desktops, embedded devices, and IoT infrastructure that support Bluetooth connectivity. Exploitation could lead to denial of service through kernel crashes, disrupting business operations, or potentially allow attackers to gain elevated privileges on affected systems. This is particularly concerning for sectors with high Bluetooth usage such as manufacturing (industrial IoT), healthcare (medical devices), transportation (vehicle systems), and public services. Additionally, organizations with remote or mobile workforces using Linux laptops with Bluetooth peripherals could be exposed to targeted attacks. The vulnerability could also be leveraged in targeted attacks against critical infrastructure or government systems that utilize Linux-based Bluetooth communications. Given the kernel-level nature of the flaw, successful exploitation could undermine system integrity and confidentiality, leading to data breaches or persistent footholds within networks.

Mitigation Recommendations

To mitigate CVE-2024-49950, organizations should promptly apply the official Linux kernel patches once released. Until patches are available, consider the following specific mitigations: 1) Disable Bluetooth functionality on Linux systems where it is not essential, reducing the attack surface. 2) For systems requiring Bluetooth, restrict Bluetooth device pairing and connections to trusted devices only, leveraging MAC address filtering and secure pairing methods. 3) Monitor kernel logs and system behavior for unusual Bluetooth-related errors or crashes that could indicate exploitation attempts. 4) Employ kernel hardening techniques such as enabling Kernel Address Sanitizer (KASAN) in testing environments to detect similar issues proactively. 5) Use network segmentation and endpoint protection to limit lateral movement if a system is compromised via this vulnerability. 6) Maintain up-to-date inventories of Linux systems and their kernel versions to prioritize patching and risk assessment. 7) For embedded or IoT devices running Linux with Bluetooth, coordinate with vendors for firmware updates addressing this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T12:17:06.046Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9824c4522896dcbdfb06

Added to database: 5/21/2025, 9:08:52 AM

Last enriched: 6/28/2025, 3:26:56 PM

Last updated: 8/14/2025, 8:57:03 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats