Skip to main content

CVE-2024-26959: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-26959cvecve-2024-26959
Published: Wed May 01 2024 (05/01/2024, 05:19:08 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btnxpuart: Fix btnxpuart_close Fix scheduling while atomic BUG in btnxpuart_close(), properly purge the transmit queue and free the receive skb. [ 10.973809] BUG: scheduling while atomic: kworker/u9:0/80/0x00000002 ... [ 10.980740] CPU: 3 PID: 80 Comm: kworker/u9:0 Not tainted 6.8.0-rc7-0.0.0-devel-00005-g61fdfceacf09 #1 [ 10.980751] Hardware name: Toradex Verdin AM62 WB on Dahlia Board (DT) [ 10.980760] Workqueue: hci0 hci_power_off [bluetooth] [ 10.981169] Call trace: ... [ 10.981363] uart_update_mctrl+0x58/0x78 [ 10.981373] uart_dtr_rts+0x104/0x114 [ 10.981381] tty_port_shutdown+0xd4/0xdc [ 10.981396] tty_port_close+0x40/0xbc [ 10.981407] uart_close+0x34/0x9c [ 10.981414] ttyport_close+0x50/0x94 [ 10.981430] serdev_device_close+0x40/0x50 [ 10.981442] btnxpuart_close+0x24/0x98 [btnxpuart] [ 10.981469] hci_dev_close_sync+0x2d8/0x718 [bluetooth] [ 10.981728] hci_dev_do_close+0x2c/0x70 [bluetooth] [ 10.981862] hci_power_off+0x20/0x64 [bluetooth]

AI-Powered Analysis

AILast updated: 06/29/2025, 13:40:02 UTC

Technical Analysis

CVE-2024-26959 is a vulnerability identified in the Linux kernel specifically affecting the Bluetooth subsystem's btnxpuart driver. The issue arises in the btnxpuart_close() function, which is responsible for closing the UART interface used by the Bluetooth device. The vulnerability is related to improper handling of scheduling while in atomic context, which is a critical kernel programming constraint. The bug manifests as an attempt to schedule tasks (which can sleep) while the kernel is in an atomic context where sleeping is forbidden. This leads to a kernel BUG and potential system instability or crash. The root cause is the failure to properly purge the transmit queue and free the receive socket buffer (skb) during the close operation, which causes the kernel to execute scheduling operations incorrectly. The provided kernel log snippet shows a stack trace indicating the failure occurs during the shutdown and close sequence of the UART port used by the Bluetooth device. This vulnerability affects Linux kernel versions around 6.8.0-rc7 and likely other versions using the btnxpuart driver. Although no known exploits are reported in the wild, the bug can cause denial of service (DoS) by crashing the kernel or causing unpredictable behavior in Bluetooth communications. The vulnerability is resolved by fixing the btnxpuart_close() function to correctly handle the transmit queue and skb freeing without scheduling in atomic context. This fix prevents the kernel BUG and stabilizes the Bluetooth UART driver behavior during device shutdown.

Potential Impact

For European organizations, the impact of CVE-2024-26959 primarily involves potential denial of service conditions on Linux systems utilizing the affected Bluetooth UART driver. This can disrupt Bluetooth communications, which may be critical in environments relying on Bluetooth for device connectivity, such as manufacturing, healthcare, logistics, and IoT deployments. A kernel crash or instability can lead to system downtime, loss of productivity, and potential safety risks if Bluetooth devices are used in operational technology or medical devices. Since the vulnerability is in the kernel, it affects all applications relying on Bluetooth functionality and can impact embedded Linux devices, servers, and desktops using affected kernel versions. Although no direct privilege escalation or remote code execution is indicated, the DoS impact on availability can be significant in critical infrastructure or enterprise environments. The lack of known exploits reduces immediate risk, but organizations should prioritize patching to avoid potential exploitation or accidental triggering of the bug.

Mitigation Recommendations

1. Apply the official Linux kernel patch that fixes the btnxpuart_close() function as soon as it is available from trusted kernel maintainers or distribution vendors. 2. For organizations using custom or embedded Linux kernels, ensure the kernel is rebuilt with the patched btnxpuart driver. 3. Monitor kernel updates from Linux distributions and apply security updates promptly. 4. If immediate patching is not possible, consider disabling Bluetooth functionality on critical systems where it is not essential to reduce attack surface and avoid triggering the bug. 5. Implement robust system monitoring to detect kernel crashes or Bluetooth subsystem failures that may indicate attempts to trigger this vulnerability. 6. Test patches in staging environments to ensure stability before deployment in production, especially for embedded or IoT devices. 7. Maintain an inventory of devices and systems running affected kernel versions to prioritize remediation efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.200Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9829c4522896dcbe2f2b

Added to database: 5/21/2025, 9:08:57 AM

Last enriched: 6/29/2025, 1:40:02 PM

Last updated: 8/16/2025, 4:18:27 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats