5.5
MEDIUM CVSS 3.1
CVE-2024-27416
Bluetooth: hci_event: Fix handling of HCI_EV_IO_CAPA_REQUEST
Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: Fix handling of HCI_EV_IO_CAPA_REQUEST If we received HCI_EV_IO_CAPA_REQUEST while HCI_OP_READ_REMOTE_EXT_FEATURES is yet to be responded assume the remote does support SSP since otherwise this event shouldn't be generated.

INFO

Published Date :

May 17, 2024, 12:15 p.m.

Last Modified :

Dec. 17, 2025, 7:38 p.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products

The following products are affected by CVE-2024-27416 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel
1 Debian debian_linux
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 MEDIUM [email protected]
Solution
To address the kernel vulnerability, update the kernel packages to the latest versions.
  • Update the affected kernel packages.
  • Reboot the system if required.
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2024-27416.

URL Resource
https://git.kernel.org/stable/c/30a5e812f78e3d1cced90e1ed750bf027599205f Patch
https://git.kernel.org/stable/c/79820a7e1e057120c49be07cbe10643d0706b259 Patch
https://git.kernel.org/stable/c/7e74aa53a68bf60f6019bd5d9a9a1406ec4d4865 Patch
https://git.kernel.org/stable/c/8e2758cc25891d2b76717aaf89b40ed215de188c Patch
https://git.kernel.org/stable/c/afec8f772296dd8e5a2a6f83bbf99db1b9ca877f Patch
https://git.kernel.org/stable/c/c3df637266df29edee85e94cab5fd7041e5753ba Patch
https://git.kernel.org/stable/c/df193568d61234c81de7ed4d540c01975de60277 Patch
https://git.kernel.org/stable/c/fba268ac36ab19f9763ff90d276cde0ce6cd5f31 Patch
https://git.kernel.org/stable/c/30a5e812f78e3d1cced90e1ed750bf027599205f Patch
https://git.kernel.org/stable/c/79820a7e1e057120c49be07cbe10643d0706b259 Patch
https://git.kernel.org/stable/c/7e74aa53a68bf60f6019bd5d9a9a1406ec4d4865 Patch
https://git.kernel.org/stable/c/8e2758cc25891d2b76717aaf89b40ed215de188c Patch
https://git.kernel.org/stable/c/afec8f772296dd8e5a2a6f83bbf99db1b9ca877f Patch
https://git.kernel.org/stable/c/c3df637266df29edee85e94cab5fd7041e5753ba Patch
https://git.kernel.org/stable/c/df193568d61234c81de7ed4d540c01975de60277 Patch
https://git.kernel.org/stable/c/fba268ac36ab19f9763ff90d276cde0ce6cd5f31 Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html Third Party Advisory
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2024-27416 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2024-27416 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2024-27416 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2024-27416 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Dec. 17, 2025

    Action Type Old Value New Value
    Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
    Added CWE NVD-CWE-noinfo
    Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:6.6:-:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.5.9 up to (excluding) 6.6 *cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 up to (excluding) 6.7.9 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.14.328 up to (excluding) 4.15 *cpe:2.3:o:linux:linux_kernel:6.6:rc7:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.19.297 up to (excluding) 4.19.309 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.10.199 up to (excluding) 5.10.212 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.15.137 up to (excluding) 5.15.151 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.4.259 up to (excluding) 5.4.271 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.1.60 up to (excluding) 6.1.81 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.6.1 up to (excluding) 6.6.21
    Added CPE Configuration OR *cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/30a5e812f78e3d1cced90e1ed750bf027599205f Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/79820a7e1e057120c49be07cbe10643d0706b259 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/7e74aa53a68bf60f6019bd5d9a9a1406ec4d4865 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/8e2758cc25891d2b76717aaf89b40ed215de188c Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/afec8f772296dd8e5a2a6f83bbf99db1b9ca877f Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/c3df637266df29edee85e94cab5fd7041e5753ba Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/df193568d61234c81de7ed4d540c01975de60277 Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/fba268ac36ab19f9763ff90d276cde0ce6cd5f31 Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/df193568d61234c81de7ed4d540c01975de60277 Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/c3df637266df29edee85e94cab5fd7041e5753ba Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/afec8f772296dd8e5a2a6f83bbf99db1b9ca877f Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/8e2758cc25891d2b76717aaf89b40ed215de188c Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/fba268ac36ab19f9763ff90d276cde0ce6cd5f31 Types: Patch
    Added Reference Type CVE: https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html Types: Third Party Advisory
    Added Reference Type CVE: https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html Types: Third Party Advisory
    Added Reference Type CVE: https://git.kernel.org/stable/c/7e74aa53a68bf60f6019bd5d9a9a1406ec4d4865 Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/79820a7e1e057120c49be07cbe10643d0706b259 Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/30a5e812f78e3d1cced90e1ed750bf027599205f Types: Patch
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://git.kernel.org/stable/c/30a5e812f78e3d1cced90e1ed750bf027599205f
    Added Reference https://git.kernel.org/stable/c/79820a7e1e057120c49be07cbe10643d0706b259
    Added Reference https://git.kernel.org/stable/c/7e74aa53a68bf60f6019bd5d9a9a1406ec4d4865
    Added Reference https://git.kernel.org/stable/c/8e2758cc25891d2b76717aaf89b40ed215de188c
    Added Reference https://git.kernel.org/stable/c/afec8f772296dd8e5a2a6f83bbf99db1b9ca877f
    Added Reference https://git.kernel.org/stable/c/c3df637266df29edee85e94cab5fd7041e5753ba
    Added Reference https://git.kernel.org/stable/c/df193568d61234c81de7ed4d540c01975de60277
    Added Reference https://git.kernel.org/stable/c/fba268ac36ab19f9763ff90d276cde0ce6cd5f31
    Added Reference https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
    Added Reference https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
  • CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Nov. 05, 2024

    Action Type Old Value New Value
    Removed Reference kernel.org https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
    Removed Reference kernel.org https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
  • CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Jun. 27, 2024

    Action Type Old Value New Value
    Added Reference kernel.org https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html [No types assigned]
  • CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Jun. 25, 2024

    Action Type Old Value New Value
    Added Reference kernel.org https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html [No types assigned]
  • CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    May. 29, 2024

    Action Type Old Value New Value
  • CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    May. 17, 2024

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: Fix handling of HCI_EV_IO_CAPA_REQUEST If we received HCI_EV_IO_CAPA_REQUEST while HCI_OP_READ_REMOTE_EXT_FEATURES is yet to be responded assume the remote does support SSP since otherwise this event shouldn't be generated.
    Added Reference kernel.org https://git.kernel.org/stable/c/afec8f772296dd8e5a2a6f83bbf99db1b9ca877f [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/79820a7e1e057120c49be07cbe10643d0706b259 [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/df193568d61234c81de7ed4d540c01975de60277 [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/c3df637266df29edee85e94cab5fd7041e5753ba [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/30a5e812f78e3d1cced90e1ed750bf027599205f [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/fba268ac36ab19f9763ff90d276cde0ce6cd5f31 [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/8e2758cc25891d2b76717aaf89b40ed215de188c [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/7e74aa53a68bf60f6019bd5d9a9a1406ec4d4865 [No types assigned]
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 5.5
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact