CVE-2024-26959: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btnxpuart: Fix btnxpuart_close Fix scheduling while atomic BUG in btnxpuart_close(), properly purge the transmit queue and free the receive skb. [ 10.973809] BUG: scheduling while atomic: kworker/u9:0/80/0x00000002 ... [ 10.980740] CPU: 3 PID: 80 Comm: kworker/u9:0 Not tainted 6.8.0-rc7-0.0.0-devel-00005-g61fdfceacf09 #1 [ 10.980751] Hardware name: Toradex Verdin AM62 WB on Dahlia Board (DT) [ 10.980760] Workqueue: hci0 hci_power_off [bluetooth] [ 10.981169] Call trace: ... [ 10.981363] uart_update_mctrl+0x58/0x78 [ 10.981373] uart_dtr_rts+0x104/0x114 [ 10.981381] tty_port_shutdown+0xd4/0xdc [ 10.981396] tty_port_close+0x40/0xbc [ 10.981407] uart_close+0x34/0x9c [ 10.981414] ttyport_close+0x50/0x94 [ 10.981430] serdev_device_close+0x40/0x50 [ 10.981442] btnxpuart_close+0x24/0x98 [btnxpuart] [ 10.981469] hci_dev_close_sync+0x2d8/0x718 [bluetooth] [ 10.981728] hci_dev_do_close+0x2c/0x70 [bluetooth] [ 10.981862] hci_power_off+0x20/0x64 [bluetooth]
AI Analysis
Technical Summary
CVE-2024-26959 is a vulnerability identified in the Linux kernel specifically affecting the Bluetooth subsystem's btnxpuart driver. The issue arises in the btnxpuart_close() function, which is responsible for closing the UART interface used by the Bluetooth device. The vulnerability is related to improper handling of scheduling while in atomic context, which is a critical kernel programming constraint. The bug manifests as an attempt to schedule tasks (which can sleep) while the kernel is in an atomic context where sleeping is forbidden. This leads to a kernel BUG and potential system instability or crash. The root cause is the failure to properly purge the transmit queue and free the receive socket buffer (skb) during the close operation, which causes the kernel to execute scheduling operations incorrectly. The provided kernel log snippet shows a stack trace indicating the failure occurs during the shutdown and close sequence of the UART port used by the Bluetooth device. This vulnerability affects Linux kernel versions around 6.8.0-rc7 and likely other versions using the btnxpuart driver. Although no known exploits are reported in the wild, the bug can cause denial of service (DoS) by crashing the kernel or causing unpredictable behavior in Bluetooth communications. The vulnerability is resolved by fixing the btnxpuart_close() function to correctly handle the transmit queue and skb freeing without scheduling in atomic context. This fix prevents the kernel BUG and stabilizes the Bluetooth UART driver behavior during device shutdown.
Potential Impact
For European organizations, the impact of CVE-2024-26959 primarily involves potential denial of service conditions on Linux systems utilizing the affected Bluetooth UART driver. This can disrupt Bluetooth communications, which may be critical in environments relying on Bluetooth for device connectivity, such as manufacturing, healthcare, logistics, and IoT deployments. A kernel crash or instability can lead to system downtime, loss of productivity, and potential safety risks if Bluetooth devices are used in operational technology or medical devices. Since the vulnerability is in the kernel, it affects all applications relying on Bluetooth functionality and can impact embedded Linux devices, servers, and desktops using affected kernel versions. Although no direct privilege escalation or remote code execution is indicated, the DoS impact on availability can be significant in critical infrastructure or enterprise environments. The lack of known exploits reduces immediate risk, but organizations should prioritize patching to avoid potential exploitation or accidental triggering of the bug.
Mitigation Recommendations
1. Apply the official Linux kernel patch that fixes the btnxpuart_close() function as soon as it is available from trusted kernel maintainers or distribution vendors. 2. For organizations using custom or embedded Linux kernels, ensure the kernel is rebuilt with the patched btnxpuart driver. 3. Monitor kernel updates from Linux distributions and apply security updates promptly. 4. If immediate patching is not possible, consider disabling Bluetooth functionality on critical systems where it is not essential to reduce attack surface and avoid triggering the bug. 5. Implement robust system monitoring to detect kernel crashes or Bluetooth subsystem failures that may indicate attempts to trigger this vulnerability. 6. Test patches in staging environments to ensure stability before deployment in production, especially for embedded or IoT devices. 7. Maintain an inventory of devices and systems running affected kernel versions to prioritize remediation efforts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2024-26959: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btnxpuart: Fix btnxpuart_close Fix scheduling while atomic BUG in btnxpuart_close(), properly purge the transmit queue and free the receive skb. [ 10.973809] BUG: scheduling while atomic: kworker/u9:0/80/0x00000002 ... [ 10.980740] CPU: 3 PID: 80 Comm: kworker/u9:0 Not tainted 6.8.0-rc7-0.0.0-devel-00005-g61fdfceacf09 #1 [ 10.980751] Hardware name: Toradex Verdin AM62 WB on Dahlia Board (DT) [ 10.980760] Workqueue: hci0 hci_power_off [bluetooth] [ 10.981169] Call trace: ... [ 10.981363] uart_update_mctrl+0x58/0x78 [ 10.981373] uart_dtr_rts+0x104/0x114 [ 10.981381] tty_port_shutdown+0xd4/0xdc [ 10.981396] tty_port_close+0x40/0xbc [ 10.981407] uart_close+0x34/0x9c [ 10.981414] ttyport_close+0x50/0x94 [ 10.981430] serdev_device_close+0x40/0x50 [ 10.981442] btnxpuart_close+0x24/0x98 [btnxpuart] [ 10.981469] hci_dev_close_sync+0x2d8/0x718 [bluetooth] [ 10.981728] hci_dev_do_close+0x2c/0x70 [bluetooth] [ 10.981862] hci_power_off+0x20/0x64 [bluetooth]
AI-Powered Analysis
Technical Analysis
CVE-2024-26959 is a vulnerability identified in the Linux kernel specifically affecting the Bluetooth subsystem's btnxpuart driver. The issue arises in the btnxpuart_close() function, which is responsible for closing the UART interface used by the Bluetooth device. The vulnerability is related to improper handling of scheduling while in atomic context, which is a critical kernel programming constraint. The bug manifests as an attempt to schedule tasks (which can sleep) while the kernel is in an atomic context where sleeping is forbidden. This leads to a kernel BUG and potential system instability or crash. The root cause is the failure to properly purge the transmit queue and free the receive socket buffer (skb) during the close operation, which causes the kernel to execute scheduling operations incorrectly. The provided kernel log snippet shows a stack trace indicating the failure occurs during the shutdown and close sequence of the UART port used by the Bluetooth device. This vulnerability affects Linux kernel versions around 6.8.0-rc7 and likely other versions using the btnxpuart driver. Although no known exploits are reported in the wild, the bug can cause denial of service (DoS) by crashing the kernel or causing unpredictable behavior in Bluetooth communications. The vulnerability is resolved by fixing the btnxpuart_close() function to correctly handle the transmit queue and skb freeing without scheduling in atomic context. This fix prevents the kernel BUG and stabilizes the Bluetooth UART driver behavior during device shutdown.
Potential Impact
For European organizations, the impact of CVE-2024-26959 primarily involves potential denial of service conditions on Linux systems utilizing the affected Bluetooth UART driver. This can disrupt Bluetooth communications, which may be critical in environments relying on Bluetooth for device connectivity, such as manufacturing, healthcare, logistics, and IoT deployments. A kernel crash or instability can lead to system downtime, loss of productivity, and potential safety risks if Bluetooth devices are used in operational technology or medical devices. Since the vulnerability is in the kernel, it affects all applications relying on Bluetooth functionality and can impact embedded Linux devices, servers, and desktops using affected kernel versions. Although no direct privilege escalation or remote code execution is indicated, the DoS impact on availability can be significant in critical infrastructure or enterprise environments. The lack of known exploits reduces immediate risk, but organizations should prioritize patching to avoid potential exploitation or accidental triggering of the bug.
Mitigation Recommendations
1. Apply the official Linux kernel patch that fixes the btnxpuart_close() function as soon as it is available from trusted kernel maintainers or distribution vendors. 2. For organizations using custom or embedded Linux kernels, ensure the kernel is rebuilt with the patched btnxpuart driver. 3. Monitor kernel updates from Linux distributions and apply security updates promptly. 4. If immediate patching is not possible, consider disabling Bluetooth functionality on critical systems where it is not essential to reduce attack surface and avoid triggering the bug. 5. Implement robust system monitoring to detect kernel crashes or Bluetooth subsystem failures that may indicate attempts to trigger this vulnerability. 6. Test patches in staging environments to ensure stability before deployment in production, especially for embedded or IoT devices. 7. Maintain an inventory of devices and systems running affected kernel versions to prioritize remediation efforts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-19T14:20:24.200Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9829c4522896dcbe2f2b
Added to database: 5/21/2025, 9:08:57 AM
Last enriched: 6/29/2025, 1:40:02 PM
Last updated: 8/16/2025, 4:18:27 PM
Views: 17
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.