CVE-2024-35967

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: SCO: Fix not validating setsockopt user input syzbot reported sco_sock_setsockopt() is copying data without checking user input length. BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset include/linux/sockptr.h:49 [inline] BUG: KASAN: slab-out-of-bounds in copy_from_sockptr include/linux/sockptr.h:55 [inline] BUG: KASAN: slab-out-of-bounds in sco_sock_setsockopt+0xc0b/0xf90 net/bluetooth/sco.c:893 Read of size 4 at addr ffff88805f7b15a3 by task syz-executor.5/12578
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

23 Dec 2025, 19:17

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/2c2dc87cdebef3fe3b9d7a711a984c70e376e32e - () https://git.kernel.org/stable/c/2c2dc87cdebef3fe3b9d7a711a984c70e376e32e - Patch
References () https://git.kernel.org/stable/c/419a0ffca7010216f0fc265b08558d7394fa0ba7 - () https://git.kernel.org/stable/c/419a0ffca7010216f0fc265b08558d7394fa0ba7 - Patch
References () https://git.kernel.org/stable/c/51eda36d33e43201e7a4fd35232e069b2c850b01 - () https://git.kernel.org/stable/c/51eda36d33e43201e7a4fd35232e069b2c850b01 - Patch
References () https://git.kernel.org/stable/c/72473db90900da970a16ee50ad23c2c38d107d8c - () https://git.kernel.org/stable/c/72473db90900da970a16ee50ad23c2c38d107d8c - Patch
References () https://git.kernel.org/stable/c/7bc65d23ba20dcd7ecc094a12c181e594e5eb315 - () https://git.kernel.org/stable/c/7bc65d23ba20dcd7ecc094a12c181e594e5eb315 - Patch
References () https://git.kernel.org/stable/c/b0e30c37695b614bee69187f86eaf250e36606ce - () https://git.kernel.org/stable/c/b0e30c37695b614bee69187f86eaf250e36606ce - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Third Party Advisory
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CWE CWE-125

02 Feb 2025, 11:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/2c2dc87cdebef3fe3b9d7a711a984c70e376e32e -

21 Nov 2024, 09:21

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
References () https://git.kernel.org/stable/c/419a0ffca7010216f0fc265b08558d7394fa0ba7 - () https://git.kernel.org/stable/c/419a0ffca7010216f0fc265b08558d7394fa0ba7 -
References () https://git.kernel.org/stable/c/51eda36d33e43201e7a4fd35232e069b2c850b01 - () https://git.kernel.org/stable/c/51eda36d33e43201e7a4fd35232e069b2c850b01 -
References () https://git.kernel.org/stable/c/72473db90900da970a16ee50ad23c2c38d107d8c - () https://git.kernel.org/stable/c/72473db90900da970a16ee50ad23c2c38d107d8c -
References () https://git.kernel.org/stable/c/7bc65d23ba20dcd7ecc094a12c181e594e5eb315 - () https://git.kernel.org/stable/c/7bc65d23ba20dcd7ecc094a12c181e594e5eb315 -
References () https://git.kernel.org/stable/c/b0e30c37695b614bee69187f86eaf250e36606ce - () https://git.kernel.org/stable/c/b0e30c37695b614bee69187f86eaf250e36606ce -

05 Nov 2024, 10:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

25 Jun 2024, 22:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: Bluetooth: SCO: la solución no valida la entrada del usuario de setsockopt. syzbot informó que sco_sock_setsockopt() está copiando datos sin verificar la longitud de la entrada del usuario. BUG: KASAN: slab fuera de los límites en copy_from_sockptr_offset include/linux/sockptr.h:49 [en línea] BUG: KASAN: slab fuera de los límites en copy_from_sockptr include/linux/sockptr.h:55 [en línea] BUG: KASAN: slab fuera de los límites en sco_sock_setsockopt+0xc0b/0xf90 net/bluetooth/sco.c:893 Lectura de tamaño 4 en la dirección ffff88805f7b15a3 mediante la tarea syz-executor.5/12578

20 May 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-20 10:15

Updated : 2025-12-23 19:17


NVD link : CVE-2024-35967

Mitre link : CVE-2024-35967

CVE.ORG link : CVE-2024-35967


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read