U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-35933 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btintel: Fix null ptr deref in btintel_read_version If hci_cmd_sync_complete() is triggered and skb is NULL, then hdev->req_skb is NULL, which will cause this issue.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/006936ecb4edfc3102464044f75858c714e34d28
https://git.kernel.org/stable/c/006936ecb4edfc3102464044f75858c714e34d28
https://git.kernel.org/stable/c/22d3053ef05f0b5045e45bd91e7473846261d65e
https://git.kernel.org/stable/c/22d3053ef05f0b5045e45bd91e7473846261d65e
https://git.kernel.org/stable/c/68a69bb2ecafaacdb998a87783068fb51736f43b
https://git.kernel.org/stable/c/68a69bb2ecafaacdb998a87783068fb51736f43b
https://git.kernel.org/stable/c/86e9b47e8a75c74b1bd83a479979b425c5dc8bd9
https://git.kernel.org/stable/c/86e9b47e8a75c74b1bd83a479979b425c5dc8bd9
https://git.kernel.org/stable/c/b19fe5eea619d54eea59bb8a37c0f8d00ef0e912
https://git.kernel.org/stable/c/b19fe5eea619d54eea59bb8a37c0f8d00ef0e912
https://git.kernel.org/stable/c/b79e040910101b020931ba0c9a6b77e81ab7f645
https://git.kernel.org/stable/c/b79e040910101b020931ba0c9a6b77e81ab7f645
https://git.kernel.org/stable/c/ec2049fb2b8be3e108fe2ef1f1040f91e72c9990
https://git.kernel.org/stable/c/ec2049fb2b8be3e108fe2ef1f1040f91e72c9990
https://git.kernel.org/stable/c/ffdca0a62abaf8c41d8d9ea132000fd808de329b
https://git.kernel.org/stable/c/ffdca0a62abaf8c41d8d9ea132000fd808de329b
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html

Weakness Enumeration

CWE-ID CWE Name Source

Change History

6 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-35933
NVD Published Date:
05/19/2024
NVD Last Modified:
11/21/2024
Source:
kernel.org