Skip to main content

CVE-2024-41063: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-41063cvecve-2024-41063
Published: Mon Jul 29 2024 (07/29/2024, 14:57:25 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_core: cancel all works upon hci_unregister_dev() syzbot is reporting that calling hci_release_dev() from hci_error_reset() due to hci_dev_put() from hci_error_reset() can cause deadlock at destroy_workqueue(), for hci_error_reset() is called from hdev->req_workqueue which destroy_workqueue() needs to flush. We need to make sure that hdev->{rx_work,cmd_work,tx_work} which are queued into hdev->workqueue and hdev->{power_on,error_reset} which are queued into hdev->req_workqueue are no longer running by the moment destroy_workqueue(hdev->workqueue); destroy_workqueue(hdev->req_workqueue); are called from hci_release_dev(). Call cancel_work_sync() on these work items from hci_unregister_dev() as soon as hdev->list is removed from hci_dev_list.

AI-Powered Analysis

AILast updated: 06/29/2025, 04:10:35 UTC

Technical Analysis

CVE-2024-41063 is a vulnerability identified in the Linux kernel's Bluetooth subsystem, specifically within the hci_core module responsible for managing Bluetooth Host Controller Interface (HCI) devices. The issue arises from improper handling of workqueue cancellation during device unregistration. The vulnerability is triggered when the function hci_release_dev() is called from hci_error_reset(), which itself is invoked from the hdev->req_workqueue. This sequence leads to a deadlock condition at the destroy_workqueue() call because destroy_workqueue() attempts to flush the workqueue that is currently executing hci_error_reset(). The root cause is that certain work items (hdev->{rx_work, cmd_work, tx_work} in hdev->workqueue and hdev->{power_on, error_reset} in hdev->req_workqueue) are not properly cancelled before the workqueues are destroyed. This improper synchronization can cause the kernel to hang or deadlock, impacting system stability. The fix involves calling cancel_work_sync() on these work items from hci_unregister_dev() immediately after removing the device from the hci_dev_list, ensuring no work items are running when the workqueues are destroyed. This vulnerability affects Linux kernel versions identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 and similar versions around this commit. No known exploits are currently in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with Bluetooth enabled, especially those that rely on Bluetooth for critical operations such as industrial control systems, IoT devices, or enterprise laptops and servers with Bluetooth peripherals. The deadlock can cause system hangs or crashes, leading to denial of service conditions. This can disrupt business operations, especially in environments where uptime and availability are critical. Additionally, systems used in healthcare, manufacturing, or transportation sectors that utilize Bluetooth connectivity could experience operational interruptions. Although no direct data breach or privilege escalation is indicated, the availability impact can indirectly affect confidentiality and integrity by causing system instability and potential loss of data during crashes. The lack of known exploits reduces immediate risk, but the vulnerability's presence in widely deployed Linux kernels means that attackers could develop exploits in the future, increasing the threat landscape.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize updating their Linux kernel to the patched versions that include the fix for CVE-2024-41063. System administrators should audit their environments for Linux systems with Bluetooth enabled and verify kernel versions against the affected commit hashes. For embedded or IoT devices where kernel updates may be slower, consider disabling Bluetooth functionality if not required to reduce attack surface. Implement monitoring for system hangs or deadlocks related to Bluetooth device operations. Additionally, organizations should review their Bluetooth device management policies and ensure proper device unregistration procedures are followed. For critical systems, consider isolating Bluetooth-enabled devices on segmented networks to limit potential impact. Finally, maintain regular backups and incident response plans to recover quickly from any availability disruptions caused by this or similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-07-12T12:17:45.628Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9827c4522896dcbe17d2

Added to database: 5/21/2025, 9:08:55 AM

Last enriched: 6/29/2025, 4:10:35 AM

Last updated: 8/15/2025, 8:00:35 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats