{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-43884","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-08-17T09:11:59.288Z","datePublished":"2024-08-26T07:11:58.043Z","dateUpdated":"2025-11-03T22:06:42.385Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T09:28:32.272Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: MGMT: Add error handling to pair_device()\n\nhci_conn_params_add() never checks for a NULL value and could lead to a NULL\npointer dereference causing a crash.\n\nFixed by adding error handling in the function."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/bluetooth/mgmt.c"],"versions":[{"version":"5157b8a503fa834e8569c7fed06981e3d3d53db0","lessThan":"11b4b0e63f2621b33b2e107407a7d67a65994ca1","status":"affected","versionType":"git"},{"version":"5157b8a503fa834e8569c7fed06981e3d3d53db0","lessThan":"90e1ff1c15e5a8f3023ca8266e3a85869ed03ee9","status":"affected","versionType":"git"},{"version":"5157b8a503fa834e8569c7fed06981e3d3d53db0","lessThan":"9df9783bd85610d3d6e126a1aca221531f6f6dcb","status":"affected","versionType":"git"},{"version":"5157b8a503fa834e8569c7fed06981e3d3d53db0","lessThan":"951d6cb5eaac5130d076c728f2a6db420621afdb","status":"affected","versionType":"git"},{"version":"5157b8a503fa834e8569c7fed06981e3d3d53db0","lessThan":"5da2884292329bc9be32a7778e0e119f06abe503","status":"affected","versionType":"git"},{"version":"5157b8a503fa834e8569c7fed06981e3d3d53db0","lessThan":"064dd929c76532359d2905d90a7c12348043cfd4","status":"affected","versionType":"git"},{"version":"5157b8a503fa834e8569c7fed06981e3d3d53db0","lessThan":"ee0799103b1ae4bcfd80dc11a15df085f6ee1b61","status":"affected","versionType":"git"},{"version":"5157b8a503fa834e8569c7fed06981e3d3d53db0","lessThan":"538fd3921afac97158d4177139a0ad39f056dbb2","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/bluetooth/mgmt.c"],"versions":[{"version":"4.3","status":"affected"},{"version":"0","lessThan":"4.3","status":"unaffected","versionType":"semver"},{"version":"4.19.321","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.283","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.225","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.166","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.107","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.48","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.10.7","lessThanOrEqual":"6.10.*","status":"unaffected","versionType":"semver"},{"version":"6.11","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.3","versionEndExcluding":"4.19.321"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.3","versionEndExcluding":"5.4.283"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.3","versionEndExcluding":"5.10.225"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.3","versionEndExcluding":"5.15.166"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.3","versionEndExcluding":"6.1.107"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.3","versionEndExcluding":"6.6.48"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.3","versionEndExcluding":"6.10.7"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.3","versionEndExcluding":"6.11"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/11b4b0e63f2621b33b2e107407a7d67a65994ca1"},{"url":"https://git.kernel.org/stable/c/90e1ff1c15e5a8f3023ca8266e3a85869ed03ee9"},{"url":"https://git.kernel.org/stable/c/9df9783bd85610d3d6e126a1aca221531f6f6dcb"},{"url":"https://git.kernel.org/stable/c/951d6cb5eaac5130d076c728f2a6db420621afdb"},{"url":"https://git.kernel.org/stable/c/5da2884292329bc9be32a7778e0e119f06abe503"},{"url":"https://git.kernel.org/stable/c/064dd929c76532359d2905d90a7c12348043cfd4"},{"url":"https://git.kernel.org/stable/c/ee0799103b1ae4bcfd80dc11a15df085f6ee1b61"},{"url":"https://git.kernel.org/stable/c/538fd3921afac97158d4177139a0ad39f056dbb2"}],"title":"Bluetooth: MGMT: Add error handling to pair_device()","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-43884","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-09-10T15:32:11.783444Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-12T17:33:09.088Z"}},{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T22:06:42.385Z"}}]}}