CVE-2024-49950: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix uaf in l2cap_connect [Syzbot reported] BUG: KASAN: slab-use-after-free in l2cap_connect.constprop.0+0x10d8/0x1270 net/bluetooth/l2cap_core.c:3949 Read of size 8 at addr ffff8880241e9800 by task kworker/u9:0/54 CPU: 0 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.11.0-rc6-syzkaller-00268-g788220eee30d #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Workqueue: hci2 hci_rx_work Call Trace: <TASK> __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:119 print_address_description mm/kasan/report.c:377 [inline] print_report+0xc3/0x620 mm/kasan/report.c:488 kasan_report+0xd9/0x110 mm/kasan/report.c:601 l2cap_connect.constprop.0+0x10d8/0x1270 net/bluetooth/l2cap_core.c:3949 l2cap_connect_req net/bluetooth/l2cap_core.c:4080 [inline] l2cap_bredr_sig_cmd net/bluetooth/l2cap_core.c:4772 [inline] l2cap_sig_channel net/bluetooth/l2cap_core.c:5543 [inline] l2cap_recv_frame+0xf0b/0x8eb0 net/bluetooth/l2cap_core.c:6825 l2cap_recv_acldata+0x9b4/0xb70 net/bluetooth/l2cap_core.c:7514 hci_acldata_packet net/bluetooth/hci_core.c:3791 [inline] hci_rx_work+0xaab/0x1610 net/bluetooth/hci_core.c:4028 process_one_work+0x9c5/0x1b40 kernel/workqueue.c:3231 process_scheduled_works kernel/workqueue.c:3312 [inline] worker_thread+0x6c8/0xed0 kernel/workqueue.c:3389 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 ... Freed by task 5245: kasan_save_stack+0x33/0x60 mm/kasan/common.c:47 kasan_save_track+0x14/0x30 mm/kasan/common.c:68 kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:579 poison_slab_object+0xf7/0x160 mm/kasan/common.c:240 __kasan_slab_free+0x32/0x50 mm/kasan/common.c:256 kasan_slab_free include/linux/kasan.h:184 [inline] slab_free_hook mm/slub.c:2256 [inline] slab_free mm/slub.c:4477 [inline] kfree+0x12a/0x3b0 mm/slub.c:4598 l2cap_conn_free net/bluetooth/l2cap_core.c:1810 [inline] kref_put include/linux/kref.h:65 [inline] l2cap_conn_put net/bluetooth/l2cap_core.c:1822 [inline] l2cap_conn_del+0x59d/0x730 net/bluetooth/l2cap_core.c:1802 l2cap_connect_cfm+0x9e6/0xf80 net/bluetooth/l2cap_core.c:7241 hci_connect_cfm include/net/bluetooth/hci_core.h:1960 [inline] hci_conn_failed+0x1c3/0x370 net/bluetooth/hci_conn.c:1265 hci_abort_conn_sync+0x75a/0xb50 net/bluetooth/hci_sync.c:5583 abort_conn_sync+0x197/0x360 net/bluetooth/hci_conn.c:2917 hci_cmd_sync_work+0x1a4/0x410 net/bluetooth/hci_sync.c:328 process_one_work+0x9c5/0x1b40 kernel/workqueue.c:3231 process_scheduled_works kernel/workqueue.c:3312 [inline] worker_thread+0x6c8/0xed0 kernel/workqueue.c:3389 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
AI Analysis
Technical Summary
CVE-2024-49950 is a use-after-free (UAF) vulnerability identified in the Linux kernel's Bluetooth subsystem, specifically within the L2CAP (Logical Link Control and Adaptation Protocol) layer. The vulnerability arises in the l2cap_connect function, which handles connection establishment for Bluetooth L2CAP channels. The issue was detected by Syzbot, an automated kernel fuzzer, and involves a slab-use-after-free condition triggered during the processing of L2CAP connection requests. The kernel's Kernel Address Sanitizer (KASAN) detected a read of freed memory, indicating that a pointer to a previously freed object was accessed, leading to undefined behavior. The call trace shows that the flaw occurs during the handling of Bluetooth signaling commands and connection confirmation routines, involving functions such as l2cap_connect_req, l2cap_bredr_sig_cmd, and l2cap_connect_cfm. The vulnerability could be exploited by an attacker capable of sending crafted Bluetooth packets to a vulnerable Linux system, potentially causing memory corruption. This could lead to kernel crashes (denial of service) or, in a worst-case scenario, privilege escalation or arbitrary code execution within the kernel context. The affected versions correspond to recent Linux kernel commits prior to the fix, including kernel version 6.11.0-rc6 and similar. No CVSS score has been assigned yet, and no known exploits are reported in the wild at this time. The vulnerability is critical because it affects the kernel's Bluetooth stack, a core component responsible for wireless communication, and use-after-free bugs are often exploitable for privilege escalation or system compromise.
Potential Impact
For European organizations, the impact of CVE-2024-49950 could be significant, especially for those relying on Linux-based systems with Bluetooth enabled. This includes enterprises using Linux servers, desktops, embedded devices, and IoT infrastructure that support Bluetooth connectivity. Exploitation could lead to denial of service through kernel crashes, disrupting business operations, or potentially allow attackers to gain elevated privileges on affected systems. This is particularly concerning for sectors with high Bluetooth usage such as manufacturing (industrial IoT), healthcare (medical devices), transportation (vehicle systems), and public services. Additionally, organizations with remote or mobile workforces using Linux laptops with Bluetooth peripherals could be exposed to targeted attacks. The vulnerability could also be leveraged in targeted attacks against critical infrastructure or government systems that utilize Linux-based Bluetooth communications. Given the kernel-level nature of the flaw, successful exploitation could undermine system integrity and confidentiality, leading to data breaches or persistent footholds within networks.
Mitigation Recommendations
To mitigate CVE-2024-49950, organizations should promptly apply the official Linux kernel patches once released. Until patches are available, consider the following specific mitigations: 1) Disable Bluetooth functionality on Linux systems where it is not essential, reducing the attack surface. 2) For systems requiring Bluetooth, restrict Bluetooth device pairing and connections to trusted devices only, leveraging MAC address filtering and secure pairing methods. 3) Monitor kernel logs and system behavior for unusual Bluetooth-related errors or crashes that could indicate exploitation attempts. 4) Employ kernel hardening techniques such as enabling Kernel Address Sanitizer (KASAN) in testing environments to detect similar issues proactively. 5) Use network segmentation and endpoint protection to limit lateral movement if a system is compromised via this vulnerability. 6) Maintain up-to-date inventories of Linux systems and their kernel versions to prioritize patching and risk assessment. 7) For embedded or IoT devices running Linux with Bluetooth, coordinate with vendors for firmware updates addressing this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2024-49950: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix uaf in l2cap_connect [Syzbot reported] BUG: KASAN: slab-use-after-free in l2cap_connect.constprop.0+0x10d8/0x1270 net/bluetooth/l2cap_core.c:3949 Read of size 8 at addr ffff8880241e9800 by task kworker/u9:0/54 CPU: 0 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.11.0-rc6-syzkaller-00268-g788220eee30d #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Workqueue: hci2 hci_rx_work Call Trace: <TASK> __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:119 print_address_description mm/kasan/report.c:377 [inline] print_report+0xc3/0x620 mm/kasan/report.c:488 kasan_report+0xd9/0x110 mm/kasan/report.c:601 l2cap_connect.constprop.0+0x10d8/0x1270 net/bluetooth/l2cap_core.c:3949 l2cap_connect_req net/bluetooth/l2cap_core.c:4080 [inline] l2cap_bredr_sig_cmd net/bluetooth/l2cap_core.c:4772 [inline] l2cap_sig_channel net/bluetooth/l2cap_core.c:5543 [inline] l2cap_recv_frame+0xf0b/0x8eb0 net/bluetooth/l2cap_core.c:6825 l2cap_recv_acldata+0x9b4/0xb70 net/bluetooth/l2cap_core.c:7514 hci_acldata_packet net/bluetooth/hci_core.c:3791 [inline] hci_rx_work+0xaab/0x1610 net/bluetooth/hci_core.c:4028 process_one_work+0x9c5/0x1b40 kernel/workqueue.c:3231 process_scheduled_works kernel/workqueue.c:3312 [inline] worker_thread+0x6c8/0xed0 kernel/workqueue.c:3389 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 ... Freed by task 5245: kasan_save_stack+0x33/0x60 mm/kasan/common.c:47 kasan_save_track+0x14/0x30 mm/kasan/common.c:68 kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:579 poison_slab_object+0xf7/0x160 mm/kasan/common.c:240 __kasan_slab_free+0x32/0x50 mm/kasan/common.c:256 kasan_slab_free include/linux/kasan.h:184 [inline] slab_free_hook mm/slub.c:2256 [inline] slab_free mm/slub.c:4477 [inline] kfree+0x12a/0x3b0 mm/slub.c:4598 l2cap_conn_free net/bluetooth/l2cap_core.c:1810 [inline] kref_put include/linux/kref.h:65 [inline] l2cap_conn_put net/bluetooth/l2cap_core.c:1822 [inline] l2cap_conn_del+0x59d/0x730 net/bluetooth/l2cap_core.c:1802 l2cap_connect_cfm+0x9e6/0xf80 net/bluetooth/l2cap_core.c:7241 hci_connect_cfm include/net/bluetooth/hci_core.h:1960 [inline] hci_conn_failed+0x1c3/0x370 net/bluetooth/hci_conn.c:1265 hci_abort_conn_sync+0x75a/0xb50 net/bluetooth/hci_sync.c:5583 abort_conn_sync+0x197/0x360 net/bluetooth/hci_conn.c:2917 hci_cmd_sync_work+0x1a4/0x410 net/bluetooth/hci_sync.c:328 process_one_work+0x9c5/0x1b40 kernel/workqueue.c:3231 process_scheduled_works kernel/workqueue.c:3312 [inline] worker_thread+0x6c8/0xed0 kernel/workqueue.c:3389 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
AI-Powered Analysis
Technical Analysis
CVE-2024-49950 is a use-after-free (UAF) vulnerability identified in the Linux kernel's Bluetooth subsystem, specifically within the L2CAP (Logical Link Control and Adaptation Protocol) layer. The vulnerability arises in the l2cap_connect function, which handles connection establishment for Bluetooth L2CAP channels. The issue was detected by Syzbot, an automated kernel fuzzer, and involves a slab-use-after-free condition triggered during the processing of L2CAP connection requests. The kernel's Kernel Address Sanitizer (KASAN) detected a read of freed memory, indicating that a pointer to a previously freed object was accessed, leading to undefined behavior. The call trace shows that the flaw occurs during the handling of Bluetooth signaling commands and connection confirmation routines, involving functions such as l2cap_connect_req, l2cap_bredr_sig_cmd, and l2cap_connect_cfm. The vulnerability could be exploited by an attacker capable of sending crafted Bluetooth packets to a vulnerable Linux system, potentially causing memory corruption. This could lead to kernel crashes (denial of service) or, in a worst-case scenario, privilege escalation or arbitrary code execution within the kernel context. The affected versions correspond to recent Linux kernel commits prior to the fix, including kernel version 6.11.0-rc6 and similar. No CVSS score has been assigned yet, and no known exploits are reported in the wild at this time. The vulnerability is critical because it affects the kernel's Bluetooth stack, a core component responsible for wireless communication, and use-after-free bugs are often exploitable for privilege escalation or system compromise.
Potential Impact
For European organizations, the impact of CVE-2024-49950 could be significant, especially for those relying on Linux-based systems with Bluetooth enabled. This includes enterprises using Linux servers, desktops, embedded devices, and IoT infrastructure that support Bluetooth connectivity. Exploitation could lead to denial of service through kernel crashes, disrupting business operations, or potentially allow attackers to gain elevated privileges on affected systems. This is particularly concerning for sectors with high Bluetooth usage such as manufacturing (industrial IoT), healthcare (medical devices), transportation (vehicle systems), and public services. Additionally, organizations with remote or mobile workforces using Linux laptops with Bluetooth peripherals could be exposed to targeted attacks. The vulnerability could also be leveraged in targeted attacks against critical infrastructure or government systems that utilize Linux-based Bluetooth communications. Given the kernel-level nature of the flaw, successful exploitation could undermine system integrity and confidentiality, leading to data breaches or persistent footholds within networks.
Mitigation Recommendations
To mitigate CVE-2024-49950, organizations should promptly apply the official Linux kernel patches once released. Until patches are available, consider the following specific mitigations: 1) Disable Bluetooth functionality on Linux systems where it is not essential, reducing the attack surface. 2) For systems requiring Bluetooth, restrict Bluetooth device pairing and connections to trusted devices only, leveraging MAC address filtering and secure pairing methods. 3) Monitor kernel logs and system behavior for unusual Bluetooth-related errors or crashes that could indicate exploitation attempts. 4) Employ kernel hardening techniques such as enabling Kernel Address Sanitizer (KASAN) in testing environments to detect similar issues proactively. 5) Use network segmentation and endpoint protection to limit lateral movement if a system is compromised via this vulnerability. 6) Maintain up-to-date inventories of Linux systems and their kernel versions to prioritize patching and risk assessment. 7) For embedded or IoT devices running Linux with Bluetooth, coordinate with vendors for firmware updates addressing this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-10-21T12:17:06.046Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9824c4522896dcbdfb06
Added to database: 5/21/2025, 9:08:52 AM
Last enriched: 6/28/2025, 3:26:56 PM
Last updated: 8/14/2025, 8:57:03 AM
Views: 18
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.