CVE-2024-53144
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/12/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE<br />
<br />
This aligned BR/EDR JUST_WORKS method with LE which since 92516cd97fd4<br />
("Bluetooth: Always request for user confirmation for Just Works")<br />
always request user confirmation with confirm_hint set since the<br />
likes of bluetoothd have dedicated policy around JUST_WORKS method<br />
(e.g. main.conf:JustWorksRepairing).<br />
<br />
CVE: CVE-2024-8805
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.2.61 (including) | 3.3 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.4.98 (including) | 3.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.10.48 (including) | 3.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.12.25 (including) | 3.13 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.14.12 (including) | 3.15 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.15.5 (including) | 3.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.16.1 (including) | 5.10.236 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.180 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.113 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.55 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.14 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11 (including) | 6.11.3 (excluding) |
| cpe:2.3:o:linux:linux_kernel:3.16:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.16:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.16:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/22b49d6e4f399a390c70f3034f5fbacbb9413858
- https://git.kernel.org/stable/c/5291ff856d2c5177b4fe9c18828312be30213193
- https://git.kernel.org/stable/c/830c03e58beb70b99349760f822e505ecb4eeb7e
- https://git.kernel.org/stable/c/ad7adfb95f64a761e4784381e47bee1a362eb30d
- https://git.kernel.org/stable/c/b25e11f978b63cb7857890edb3a698599cddb10e
- https://git.kernel.org/stable/c/baaa50c6f91ea5a9c7503af51f2bc50e6568b66b
- https://git.kernel.org/stable/c/d17c631ba04e960eb6f8728b10d585de20ac4f71
- https://www.zerodayinitiative.com/advisories/ZDI-24-1229/
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html



