CVE-2024-58013
📋 TL;DR
This is a use-after-free vulnerability in the Linux kernel's Bluetooth management subsystem. It allows attackers with local access to potentially crash the kernel or execute arbitrary code by triggering a race condition during advertisement monitor removal. Systems running vulnerable Linux kernel versions with Bluetooth enabled are affected.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash or potential privilege escalation to kernel-level code execution, enabling full system compromise.
Likely Case
Kernel crash (denial of service) causing system instability or reboot, potentially disrupting Bluetooth functionality.
If Mitigated
Limited impact if Bluetooth is disabled or access controls restrict local user privileges.
🎯 Exploit Status
Exploitation requires local access and timing precision to trigger the race condition. The KASAN report suggests it was discovered through fuzzing (syzkaller).
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patches available in stable kernel trees (commits: 0f3d05aacbfc, 26fbd3494a7d, 4ebbcb9bc794, 75e65b983c5e, ebb90f23f0ac)
Vendor Advisory: https://git.kernel.org/stable/c/0f3d05aacbfcf3584bbd9caaee34cb02508dab68
Restart Required: Yes
Instructions:
1. Update to a patched Linux kernel version from your distribution's repositories. 2. For custom kernels, apply the relevant patches from the stable kernel git tree. 3. Reboot the system to load the new kernel.
🔧 Temporary Workarounds
Disable Bluetooth
LinuxCompletely disable Bluetooth functionality to eliminate the attack surface.
sudo systemctl stop bluetooth
sudo systemctl disable bluetooth
sudo rmmod btusb bluetooth
Restrict Bluetooth access
LinuxUse kernel module blacklisting to prevent Bluetooth modules from loading.
echo 'blacklist bluetooth' | sudo tee /etc/modprobe.d/disable-bluetooth.conf
sudo update-initramfs -u
🧯 If You Can't Patch
- Disable Bluetooth functionality entirely if not needed
- Implement strict access controls to limit local user privileges on affected systems
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if Bluetooth is active: 'uname -r' and 'systemctl status bluetooth' or 'lsmod | grep bluetooth'
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is updated to a patched version and check that Bluetooth functionality still works properly after patch.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages in /var/log/kern.log or dmesg
- KASAN reports mentioning mgmt_remove_adv_monitor_sync
- System crashes or unexpected reboots
Network Indicators:
- Sudden loss of Bluetooth connectivity
SIEM Query:
source="kernel" AND ("KASAN" OR "slab-use-after-free" OR "mgmt_remove_adv_monitor")
🔗 References
- https://git.kernel.org/stable/c/0f3d05aacbfcf3584bbd9caaee34cb02508dab68
- https://git.kernel.org/stable/c/26fbd3494a7dd26269cb0817c289267dbcfdec06
- https://git.kernel.org/stable/c/4ebbcb9bc794e5be647ee28fdf14eb1ae0659405
- https://git.kernel.org/stable/c/75e65b983c5e2ee51962bfada98a79d805f28827
- https://git.kernel.org/stable/c/ebb90f23f0ac21044aacf4c61cc5d7841fe99987
- https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html