Skip to main content

CVE-2024-50044: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-50044cvecve-2024-50044
Published: Mon Oct 21 2024 (10/21/2024, 19:39:42 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change rfcomm_sk_state_change attempts to use sock_lock so it must never be called with it locked but rfcomm_sock_ioctl always attempt to lock it causing the following trace: ====================================================== WARNING: possible circular locking dependency detected 6.8.0-syzkaller-08951-gfe46a7dd189e #0 Not tainted ------------------------------------------------------ syz-executor386/5093 is trying to acquire lock: ffff88807c396258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1671 [inline] ffff88807c396258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: rfcomm_sk_state_change+0x5b/0x310 net/bluetooth/rfcomm/sock.c:73 but task is already holding lock: ffff88807badfd28 (&d->lock){+.+.}-{3:3}, at: __rfcomm_dlc_close+0x226/0x6a0 net/bluetooth/rfcomm/core.c:491

AI-Powered Analysis

AILast updated: 06/28/2025, 16:40:36 UTC

Technical Analysis

CVE-2024-50044 is a vulnerability identified in the Linux kernel's Bluetooth RFCOMM protocol implementation. Specifically, the issue arises from a potential deadlock condition in the function rfcomm_sk_state_change. This function attempts to acquire a socket lock (sock_lock), but it must not be called when this lock is already held. However, rfcomm_sock_ioctl, another function in the RFCOMM stack, always attempts to acquire this lock before calling rfcomm_sk_state_change. This leads to a circular locking dependency, as evidenced by kernel warnings about possible deadlocks and circular locking dependencies. The trace shows that a task tries to acquire the sk_lock while already holding another lock (&d->lock), causing a deadlock scenario. This deadlock can freeze or hang the Bluetooth RFCOMM socket operations, potentially impacting system stability or availability. The vulnerability affects multiple versions of the Linux kernel, as indicated by the repeated commit hashes, and was published on October 21, 2024. No CVSS score has been assigned yet, and there are no known exploits in the wild. The root cause is a synchronization flaw in the Bluetooth RFCOMM socket state management, which can cause kernel-level deadlocks during Bluetooth communication over RFCOMM channels.

Potential Impact

For European organizations, this vulnerability could have significant operational impacts, especially for those relying on Linux-based systems with Bluetooth functionality. The deadlock can cause system hangs or degraded performance in devices using Bluetooth RFCOMM, which is commonly used for serial port emulation over Bluetooth. This may affect embedded systems, IoT devices, industrial control systems, and enterprise Linux servers or workstations that utilize Bluetooth for device communication or management. In critical infrastructure sectors such as manufacturing, healthcare, transportation, and telecommunications, where Linux is prevalent and Bluetooth connectivity is used, this could lead to service interruptions or degraded device functionality. Although this vulnerability does not directly lead to privilege escalation or data leakage, the availability impact due to deadlocks can disrupt business operations and potentially delay critical processes. The lack of known exploits reduces immediate risk, but the presence of a kernel-level deadlock vulnerability means that attackers or even benign processes could trigger system instability, which is a concern for high-availability environments.

Mitigation Recommendations

To mitigate this vulnerability, organizations should promptly apply the official Linux kernel patches once they are released by the Linux maintainers. Until patches are available, consider disabling Bluetooth RFCOMM functionality if it is not essential, especially on critical systems. For systems where Bluetooth is required, monitor kernel updates closely and test patches in staging environments before deployment. Additionally, implement kernel crash and hang detection mechanisms to quickly identify and recover from deadlock conditions. Employ strict access controls to limit which users or processes can interact with Bluetooth devices or invoke ioctl calls on RFCOMM sockets, reducing the risk of accidental or malicious triggering of the deadlock. For embedded or IoT devices, coordinate with device vendors to ensure timely firmware or kernel updates. Finally, maintain comprehensive logging and monitoring of Bluetooth subsystem activity to detect unusual behavior that might indicate attempts to exploit this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T12:17:06.071Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9824c4522896dcbdfdaa

Added to database: 5/21/2025, 9:08:52 AM

Last enriched: 6/28/2025, 4:40:36 PM

Last updated: 8/18/2025, 11:32:19 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats