
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, a vulnerability has been identified and resolved related to Bluetooth HCI (Host Controller Interface) functionality. The issue involves the removal of HCIAMP (Alternate MAC/PHY) support, as it is no longer needed after BTHS was removed. This change removes the capability of creating AMP controllers and eliminates the differentiation between AMP and Primary controllers, since only HCI_PRIMARY remains (Kernel Git).
The vulnerability involves the removal of legacy code related to HCIAMP support in the Linux kernel's Bluetooth subsystem. The change removes multiple components including AMP controller types, AMP controller status definitions, AMP-related structures, and flow control modes. The fix removes hdev->devtype attribute altogether since there is no longer a need to differentiate between controller types (Kernel Git).
The impact of this vulnerability is primarily related to system maintenance and code cleanup rather than security. The removal of unused AMP support code reduces the attack surface and simplifies the codebase, though no direct security implications were reported.
The issue has been fixed in the Linux kernel through a patch that removes HCI_AMP support entirely. The fix is tracked under CVE-2024-38620 and has been integrated into various Linux kernel versions. Users should update to the patched kernel version to receive this code cleanup (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."