PatchSiren

PatchSiren cyber security CVE debrief

CVE-2024-24859 Linux CVE debrief

CVE-2024-24859 describes a race condition in the Linux kernel's Bluetooth networking code, specifically in sniff_{min,max}_interval_set(). According to NVD, the issue can trigger a Bluetooth sniffing exception and may lead to denial of service. The CVE is publicly disclosed and mapped by NVD to CWE-362 (race condition).

Vendor
Linux
Product
CVE-2024-24859
CVSS
MEDIUM 4.6
CISA KEV
Not listed in stored evidence
Original CVE published
2024-02-05
Original CVE updated
2026-05-12
Advisory published
2024-02-05
Advisory updated
2026-05-12

Who should care

Linux kernel maintainers, Linux distribution security teams, and operators of systems that expose or rely on Bluetooth functionality should review this issue. It is most relevant where the affected kernel versions are in use and Bluetooth is enabled or reachable.

Technical summary

NVD describes a race condition in net/bluetooth sniff_{min,max}_interval_set() that can result in a Bluetooth sniffing exception issue. The published CVSS vector is AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:H, indicating local adjacency, high attack complexity, high privileges, and required user interaction, with denial-of-service impact as the main concern. NVD lists affected Linux kernel ranges including versions up to 3.19.8, 6.0 through 6.7.2, and 6.8-rc1.

Defensive priority

Medium. The impact is primarily availability-related, but exploitation conditions are relatively constrained by high privileges, user interaction, and adjacent network requirements in the published CVSS vector. Prioritize if Bluetooth is enabled on exposed or business-critical Linux systems.

Recommended defensive actions

  • Identify Linux kernel builds that match the affected version ranges listed by NVD, including vendor backports in distribution kernels.
  • Apply the vendor- or distribution-provided kernel update that addresses the race condition once available.
  • Verify whether Bluetooth is enabled or required on the affected hosts and reduce exposure where it is not needed.
  • Monitor distribution security advisories and the linked issue-tracking references for backported fixes and package-specific remediation guidance.
  • After updating, confirm the running kernel package and reboot requirements have been satisfied.

Evidence notes

This debrief is based on the published CVE record and NVD detail entry. NVD maps the issue to CWE-362 and publishes the CVSS v3.1 vector AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:H with severity Medium. NVD's affected CPE criteria list linux_kernel versions up to 3.19.8, 6.0 through 6.7.2, and 6.8-rc1. NVD references an OpenAnolis Bugzilla issue and a Siemens CERT advisory as source material. Because distribution kernels may backport fixes, actual exposure should be validated against vendor package versions rather than upstream version strings alone.

Official resources

CVE published on 2024-02-05; NVD record last modified on 2026-05-12. The issue is publicly documented in the CVE record and NVD entry.