CVE-2024-35967

7.1 HIGH

📋 TL;DR

This CVE-2024-35967 is a Linux kernel Bluetooth SCO socket vulnerability where the kernel fails to validate user input length in setsockopt calls, allowing out-of-bounds memory reads. This affects any system running vulnerable Linux kernel versions with Bluetooth functionality enabled. Attackers could potentially read kernel memory or cause denial of service.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific vulnerable kernel versions referenced in the git commits (check stable branches for exact ranges)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable if Bluetooth subsystem is enabled and SCO sockets are used. Many servers have Bluetooth disabled by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel memory disclosure leading to information leakage, privilege escalation, or system crash/panic.

🟠

Likely Case

Denial of service through kernel panic or system instability when malicious input triggers the out-of-bounds read.

🟢

If Mitigated

Minimal impact if Bluetooth is disabled or systems are properly patched.

🌐 Internet-Facing: LOW - Requires local access or Bluetooth proximity; not directly exploitable over internet.
🏢 Internal Only: MEDIUM - Local attackers or malicious users could exploit this to crash systems or leak kernel memory.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access or ability to interact with Bluetooth sockets. Discovered via syzkaller fuzzing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing fixes from the referenced git commits

Vendor Advisory: https://git.kernel.org/stable/c/2c2dc87cdebef3fe3b9d7a711a984c70e376e32e

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution. 2. For custom kernels, apply the fix commits. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable Bluetooth

linux

Completely disable Bluetooth subsystem to prevent exploitation

sudo systemctl disable bluetooth
sudo systemctl stop bluetooth
sudo rmmod btusb bluetooth

Blacklist Bluetooth modules

linux

Prevent Bluetooth kernel modules from loading

echo 'blacklist bluetooth' | sudo tee /etc/modprobe.d/disable-bluetooth.conf
echo 'blacklist btusb' | sudo tee -a /etc/modprobe.d/disable-bluetooth.conf

🧯 If You Can't Patch

  • Disable Bluetooth functionality completely using workaround commands
  • Restrict local user access to systems and monitor for suspicious Bluetooth socket operations

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if Bluetooth is enabled: uname -r && systemctl status bluetooth

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated beyond vulnerable commits and Bluetooth is either disabled or patched

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • KASAN out-of-bounds read warnings in dmesg
  • Bluetooth socket error messages

Network Indicators:

  • Unusual Bluetooth socket operations from unexpected processes

SIEM Query:

source="kernel" AND ("KASAN" OR "slab-out-of-bounds" OR "sco_sock")

🔗 References

📤 Share & Export