CVE-2024-50029

7.8 HIGH

📋 TL;DR

This CVE describes a use-after-free vulnerability in the Linux kernel's Bluetooth subsystem. An attacker could potentially exploit this to crash the kernel or execute arbitrary code with kernel privileges. Systems running vulnerable Linux kernel versions with Bluetooth enabled are affected.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Versions before the fix commits (specific versions depend on distribution backports)
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Bluetooth functionality enabled and in use. The vulnerability is triggered during Bluetooth connection setup.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash or potential arbitrary code execution with kernel privileges, resulting in complete system compromise.

🟠

Likely Case

Kernel panic causing system instability or crash, requiring reboot to restore functionality.

🟢

If Mitigated

System remains stable with no impact if Bluetooth is disabled or the vulnerability is patched.

🌐 Internet-Facing: LOW - This vulnerability requires local access or proximity for Bluetooth exploitation, not directly exploitable over internet.
🏢 Internal Only: MEDIUM - Attackers with local access or within Bluetooth range could potentially exploit this to crash systems or gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires Bluetooth access and timing to trigger the race condition. No public exploits have been reported as of the CVE publication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits: 18fd04ad856df07733f5bb07e7f7168e7443d393, 867639300759e3e1c5b1e1a5ff89231f263a32a7, 98ccd44002d88cbf4edfc4480df532a3da5a013e

Vendor Advisory: https://git.kernel.org/stable/c/18fd04ad856df07733f5bb07e7f7168e7443d393

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Check your distribution's security advisories for backported patches. 3. Reboot the system after kernel update.

🔧 Temporary Workarounds

Disable Bluetooth

linux

Temporarily disable Bluetooth functionality to prevent exploitation

sudo systemctl stop bluetooth
sudo systemctl disable bluetooth
sudo rfkill block bluetooth

🧯 If You Can't Patch

  • Disable Bluetooth functionality completely on affected systems
  • Implement network segmentation to limit Bluetooth device access to trusted networks only

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if Bluetooth is enabled: 'uname -r' and 'systemctl status bluetooth'

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated and contains the fix commits: 'uname -r' and check distribution patch notes

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • KASAN reports in dmesg
  • Bluetooth subsystem crashes

Network Indicators:

  • Unusual Bluetooth connection attempts
  • Multiple failed Bluetooth pairing attempts

SIEM Query:

source="kernel" AND ("KASAN" OR "use-after-free" OR "hci_enhanced_setup_sync")

🔗 References

📤 Share & Export