CVE-2024-35965

7.1 HIGH

📋 TL;DR

This CVE-2024-35965 is a Linux kernel Bluetooth L2CAP vulnerability where the kernel fails to validate user input length before copying data in setsockopt operations. This allows local attackers to trigger memory corruption or kernel crashes. Systems with Bluetooth enabled and running vulnerable Linux kernel versions are affected.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific vulnerable versions not explicitly stated in CVE, but patches exist in stable kernel trees. Likely affects multiple kernel versions before fixes were backported.
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Bluetooth functionality enabled and accessible to local users.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to root, kernel panic causing system crash, or arbitrary code execution in kernel context.

🟠

Likely Case

Local denial of service (kernel crash/panic) or information disclosure through memory corruption.

🟢

If Mitigated

Minimal impact if Bluetooth is disabled or proper access controls restrict local user privileges.

🌐 Internet-Facing: LOW - Requires local access to the system, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Local attackers or malicious users could exploit this to crash systems or potentially escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to call setsockopt on Bluetooth sockets. Exploitation would require crafting specific input to trigger memory corruption.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available in stable kernel trees (commits referenced in CVE). Check specific distribution kernel versions.

Vendor Advisory: https://git.kernel.org/stable/c/28234f8ab69c522ba447f3e041bbfbb284c5959a

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution. 2. For RHEL/CentOS: yum update kernel. 3. For Ubuntu/Debian: apt update && apt upgrade linux-image-*. 4. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable Bluetooth

linux

Completely disable Bluetooth functionality to prevent exploitation

systemctl stop bluetooth
systemctl disable bluetooth
rfkill block bluetooth

Restrict Bluetooth socket access

linux

Use SELinux/AppArmor to restrict which users can access Bluetooth sockets

# Configure SELinux/AppArmor policies to restrict Bluetooth socket access

🧯 If You Can't Patch

  • Disable Bluetooth functionality completely
  • Restrict local user access and implement strict privilege separation

🔍 How to Verify

Check if Vulnerable:

Check kernel version and compare with distribution security advisories. Check if Bluetooth is enabled: systemctl status bluetooth

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version after update matches patched version from distribution. Check that Bluetooth functionality still works if needed.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • Bluetooth subsystem crashes in dmesg
  • Unexpected Bluetooth socket operations from non-privileged users

Network Indicators:

  • None - local exploit only

SIEM Query:

Search for: 'kernel panic' OR 'Oops' OR 'segfault' in system logs from Bluetooth-related processes

🔗 References

📤 Share & Export