Skip to main content

CVE-2024-56605: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-56605cvecve-2024-56605
Published: Fri Dec 27 2024 (12/27/2024, 14:51:10 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() bt_sock_alloc() allocates the sk object and attaches it to the provided sock object. On error l2cap_sock_alloc() frees the sk object, but the dangling pointer is still attached to the sock object, which may create use-after-free in other code.

AI-Powered Analysis

AILast updated: 07/02/2025, 23:25:26 UTC

Technical Analysis

CVE-2024-56605 is a high-severity vulnerability in the Linux kernel's Bluetooth subsystem, specifically within the L2CAP (Logical Link Control and Adaptation Protocol) layer. The flaw arises in the function l2cap_sock_create(), where an error handling path improperly manages socket (sk) pointers. The function bt_sock_alloc() allocates a socket object and attaches it to a sock structure. However, if an error occurs, l2cap_sock_alloc() frees the allocated socket object but fails to clear the pointer attached to the sock structure, leaving a dangling pointer. This use-after-free condition can be triggered by local users with limited privileges (PR:L), without requiring user interaction (UI:N). Exploiting this vulnerability could allow an attacker to execute arbitrary code or cause a denial of service by corrupting kernel memory, impacting confidentiality, integrity, and availability of the affected system. The vulnerability has a CVSS v3.1 score of 7.8, indicating high severity, with attack vector being local (AV:L), low attack complexity (AC:L), and no user interaction needed. The vulnerability is categorized under CWE-416 (Use After Free). No known exploits are currently reported in the wild, but the presence of a use-after-free in kernel Bluetooth code is a significant risk, especially for systems relying on Bluetooth connectivity. The affected versions are identified by specific commit hashes, indicating that the issue is present in recent Linux kernel versions prior to the patch. This vulnerability requires local access, meaning an attacker must have some level of access to the system, but given the widespread use of Linux in servers, desktops, and embedded devices, the risk is considerable.

Potential Impact

For European organizations, the impact of CVE-2024-56605 can be substantial, especially for those relying on Linux-based infrastructure with Bluetooth enabled. The vulnerability could be exploited to gain elevated privileges or execute arbitrary code on affected systems, potentially leading to data breaches, service disruption, or lateral movement within networks. Critical sectors such as finance, healthcare, manufacturing, and government agencies that use Linux servers or embedded Linux devices with Bluetooth capabilities could face confidentiality and integrity compromises. The use-after-free condition could also cause system crashes, leading to denial of service and operational downtime. Given the local attack vector, insider threats or compromised user accounts could leverage this vulnerability to escalate privileges. Additionally, IoT devices and industrial control systems running Linux with Bluetooth support in European critical infrastructure could be at risk, impacting availability and safety. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits following public disclosure. Organizations with remote access to Linux systems or those that allow users to connect Bluetooth devices should prioritize mitigation to prevent exploitation.

Mitigation Recommendations

European organizations should implement the following specific mitigation strategies: 1) Apply the latest Linux kernel patches that address CVE-2024-56605 as soon as they become available, ensuring all affected systems are updated promptly. 2) Audit and restrict local user privileges to minimize the number of users who can execute code or access Bluetooth subsystems. 3) Disable Bluetooth on Linux systems where it is not required, especially on servers and critical infrastructure devices, to reduce the attack surface. 4) Employ kernel security modules (e.g., SELinux, AppArmor) to enforce strict access controls on Bluetooth-related kernel objects and limit potential exploitation paths. 5) Monitor system logs and kernel messages for unusual Bluetooth activity or errors indicative of exploitation attempts. 6) For environments with embedded Linux devices, coordinate with vendors to ensure firmware updates include the patch. 7) Implement network segmentation to isolate Linux systems with Bluetooth enabled from sensitive network segments. 8) Conduct regular vulnerability scanning and penetration testing focusing on local privilege escalation vectors. These targeted measures go beyond generic advice by focusing on the Bluetooth subsystem, local privilege management, and kernel-level protections.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-27T14:03:06.013Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9823c4522896dcbdf37e

Added to database: 5/21/2025, 9:08:51 AM

Last enriched: 7/2/2025, 11:25:26 PM

Last updated: 7/31/2025, 8:26:32 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats