CVE-2024-49951: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix possible crash on mgmt_index_removed If mgmt_index_removed is called while there are commands queued on cmd_sync it could lead to crashes like the bellow trace: 0x0000053D: __list_del_entry_valid_or_report+0x98/0xdc 0x0000053D: mgmt_pending_remove+0x18/0x58 [bluetooth] 0x0000053E: mgmt_remove_adv_monitor_complete+0x80/0x108 [bluetooth] 0x0000053E: hci_cmd_sync_work+0xbc/0x164 [bluetooth] So while handling mgmt_index_removed this attempts to dequeue commands passed as user_data to cmd_sync.
AI Analysis
Technical Summary
CVE-2024-49951 is a vulnerability identified in the Linux kernel's Bluetooth management subsystem. Specifically, the issue arises in the handling of the mgmt_index_removed event within the Bluetooth MGMT interface. The vulnerability occurs when mgmt_index_removed is invoked while there are commands queued on cmd_sync, a synchronous command queue used in Bluetooth management operations. Under these conditions, the kernel attempts to dequeue commands passed as user_data to cmd_sync, which can lead to a use-after-free or invalid list manipulation, resulting in a kernel crash. The crash manifests through invalid list entry deletion, as indicated by the stack trace involving __list_del_entry_valid_or_report and mgmt_pending_remove functions. This vulnerability can cause denial of service (DoS) by crashing the kernel, potentially impacting system stability and availability. The flaw is rooted in improper synchronization and queue management in the Bluetooth MGMT command handling code. The vulnerability affects Linux kernel versions identified by the commit hash 7cf5c2978f23fdbb2dd7b4e8b07e362ae2d8211c, and it has been resolved in updated kernel releases. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The issue does not appear to allow privilege escalation or remote code execution but can be triggered locally or through Bluetooth management commands, possibly requiring user interaction or local access to the Bluetooth interface.
Potential Impact
For European organizations, the primary impact of CVE-2024-49951 is the risk of denial of service on Linux-based systems that utilize Bluetooth functionality. This includes servers, desktops, laptops, and embedded devices running vulnerable Linux kernels. Organizations relying on Linux for critical infrastructure, industrial control systems, or IoT devices with Bluetooth capabilities could experience system crashes leading to downtime, disruption of services, or loss of availability. In sectors such as manufacturing, healthcare, transportation, and telecommunications, where Linux is prevalent and Bluetooth is used for device management or connectivity, this vulnerability could affect operational continuity. Although the vulnerability does not currently have known exploits, the potential for attackers or malware to trigger kernel crashes remotely or locally could be leveraged to disrupt business operations or cause denial of service. The impact on confidentiality and integrity is minimal since the vulnerability primarily causes crashes rather than unauthorized access or data manipulation. However, repeated crashes could lead to system instability and increased maintenance costs. Organizations with strict uptime requirements or those operating critical Bluetooth-enabled Linux devices should prioritize addressing this vulnerability.
Mitigation Recommendations
To mitigate CVE-2024-49951, European organizations should: 1) Apply the latest Linux kernel patches that address the mgmt_index_removed handling flaw as soon as they become available from trusted Linux distributors or upstream kernel sources. 2) Temporarily disable or restrict Bluetooth functionality on critical systems where Bluetooth is not essential, reducing the attack surface until patches are applied. 3) Implement strict access controls to limit who can interact with the Bluetooth management interface, minimizing the risk of unauthorized triggering of the vulnerability. 4) Monitor system logs and kernel messages for signs of Bluetooth-related crashes or unusual mgmt_index_removed events to detect potential exploitation attempts. 5) For embedded or IoT devices, coordinate with vendors to ensure firmware updates include the patched kernel version. 6) Conduct thorough testing of Bluetooth-dependent applications and services after patching to ensure stability and compatibility. 7) Educate system administrators about the vulnerability and the importance of timely patch management, especially for Linux systems with Bluetooth capabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2024-49951: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix possible crash on mgmt_index_removed If mgmt_index_removed is called while there are commands queued on cmd_sync it could lead to crashes like the bellow trace: 0x0000053D: __list_del_entry_valid_or_report+0x98/0xdc 0x0000053D: mgmt_pending_remove+0x18/0x58 [bluetooth] 0x0000053E: mgmt_remove_adv_monitor_complete+0x80/0x108 [bluetooth] 0x0000053E: hci_cmd_sync_work+0xbc/0x164 [bluetooth] So while handling mgmt_index_removed this attempts to dequeue commands passed as user_data to cmd_sync.
AI-Powered Analysis
Technical Analysis
CVE-2024-49951 is a vulnerability identified in the Linux kernel's Bluetooth management subsystem. Specifically, the issue arises in the handling of the mgmt_index_removed event within the Bluetooth MGMT interface. The vulnerability occurs when mgmt_index_removed is invoked while there are commands queued on cmd_sync, a synchronous command queue used in Bluetooth management operations. Under these conditions, the kernel attempts to dequeue commands passed as user_data to cmd_sync, which can lead to a use-after-free or invalid list manipulation, resulting in a kernel crash. The crash manifests through invalid list entry deletion, as indicated by the stack trace involving __list_del_entry_valid_or_report and mgmt_pending_remove functions. This vulnerability can cause denial of service (DoS) by crashing the kernel, potentially impacting system stability and availability. The flaw is rooted in improper synchronization and queue management in the Bluetooth MGMT command handling code. The vulnerability affects Linux kernel versions identified by the commit hash 7cf5c2978f23fdbb2dd7b4e8b07e362ae2d8211c, and it has been resolved in updated kernel releases. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The issue does not appear to allow privilege escalation or remote code execution but can be triggered locally or through Bluetooth management commands, possibly requiring user interaction or local access to the Bluetooth interface.
Potential Impact
For European organizations, the primary impact of CVE-2024-49951 is the risk of denial of service on Linux-based systems that utilize Bluetooth functionality. This includes servers, desktops, laptops, and embedded devices running vulnerable Linux kernels. Organizations relying on Linux for critical infrastructure, industrial control systems, or IoT devices with Bluetooth capabilities could experience system crashes leading to downtime, disruption of services, or loss of availability. In sectors such as manufacturing, healthcare, transportation, and telecommunications, where Linux is prevalent and Bluetooth is used for device management or connectivity, this vulnerability could affect operational continuity. Although the vulnerability does not currently have known exploits, the potential for attackers or malware to trigger kernel crashes remotely or locally could be leveraged to disrupt business operations or cause denial of service. The impact on confidentiality and integrity is minimal since the vulnerability primarily causes crashes rather than unauthorized access or data manipulation. However, repeated crashes could lead to system instability and increased maintenance costs. Organizations with strict uptime requirements or those operating critical Bluetooth-enabled Linux devices should prioritize addressing this vulnerability.
Mitigation Recommendations
To mitigate CVE-2024-49951, European organizations should: 1) Apply the latest Linux kernel patches that address the mgmt_index_removed handling flaw as soon as they become available from trusted Linux distributors or upstream kernel sources. 2) Temporarily disable or restrict Bluetooth functionality on critical systems where Bluetooth is not essential, reducing the attack surface until patches are applied. 3) Implement strict access controls to limit who can interact with the Bluetooth management interface, minimizing the risk of unauthorized triggering of the vulnerability. 4) Monitor system logs and kernel messages for signs of Bluetooth-related crashes or unusual mgmt_index_removed events to detect potential exploitation attempts. 5) For embedded or IoT devices, coordinate with vendors to ensure firmware updates include the patched kernel version. 6) Conduct thorough testing of Bluetooth-dependent applications and services after patching to ensure stability and compatibility. 7) Educate system administrators about the vulnerability and the importance of timely patch management, especially for Linux systems with Bluetooth capabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-10-21T12:17:06.046Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9824c4522896dcbdfb24
Added to database: 5/21/2025, 9:08:52 AM
Last enriched: 6/28/2025, 3:27:09 PM
Last updated: 7/31/2025, 7:09:40 AM
Views: 11
Related Threats
CVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9087: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.