CVE-2024-50044: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change rfcomm_sk_state_change attempts to use sock_lock so it must never be called with it locked but rfcomm_sock_ioctl always attempt to lock it causing the following trace: ====================================================== WARNING: possible circular locking dependency detected 6.8.0-syzkaller-08951-gfe46a7dd189e #0 Not tainted ------------------------------------------------------ syz-executor386/5093 is trying to acquire lock: ffff88807c396258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1671 [inline] ffff88807c396258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: rfcomm_sk_state_change+0x5b/0x310 net/bluetooth/rfcomm/sock.c:73 but task is already holding lock: ffff88807badfd28 (&d->lock){+.+.}-{3:3}, at: __rfcomm_dlc_close+0x226/0x6a0 net/bluetooth/rfcomm/core.c:491
AI Analysis
Technical Summary
CVE-2024-50044 is a vulnerability identified in the Linux kernel's Bluetooth RFCOMM protocol implementation. Specifically, the issue arises from a potential deadlock condition in the function rfcomm_sk_state_change. This function attempts to acquire a socket lock (sock_lock), but it must not be called when this lock is already held. However, rfcomm_sock_ioctl, another function in the RFCOMM stack, always attempts to acquire this lock before calling rfcomm_sk_state_change. This leads to a circular locking dependency, as evidenced by kernel warnings about possible deadlocks and circular locking dependencies. The trace shows that a task tries to acquire the sk_lock while already holding another lock (&d->lock), causing a deadlock scenario. This deadlock can freeze or hang the Bluetooth RFCOMM socket operations, potentially impacting system stability or availability. The vulnerability affects multiple versions of the Linux kernel, as indicated by the repeated commit hashes, and was published on October 21, 2024. No CVSS score has been assigned yet, and there are no known exploits in the wild. The root cause is a synchronization flaw in the Bluetooth RFCOMM socket state management, which can cause kernel-level deadlocks during Bluetooth communication over RFCOMM channels.
Potential Impact
For European organizations, this vulnerability could have significant operational impacts, especially for those relying on Linux-based systems with Bluetooth functionality. The deadlock can cause system hangs or degraded performance in devices using Bluetooth RFCOMM, which is commonly used for serial port emulation over Bluetooth. This may affect embedded systems, IoT devices, industrial control systems, and enterprise Linux servers or workstations that utilize Bluetooth for device communication or management. In critical infrastructure sectors such as manufacturing, healthcare, transportation, and telecommunications, where Linux is prevalent and Bluetooth connectivity is used, this could lead to service interruptions or degraded device functionality. Although this vulnerability does not directly lead to privilege escalation or data leakage, the availability impact due to deadlocks can disrupt business operations and potentially delay critical processes. The lack of known exploits reduces immediate risk, but the presence of a kernel-level deadlock vulnerability means that attackers or even benign processes could trigger system instability, which is a concern for high-availability environments.
Mitigation Recommendations
To mitigate this vulnerability, organizations should promptly apply the official Linux kernel patches once they are released by the Linux maintainers. Until patches are available, consider disabling Bluetooth RFCOMM functionality if it is not essential, especially on critical systems. For systems where Bluetooth is required, monitor kernel updates closely and test patches in staging environments before deployment. Additionally, implement kernel crash and hang detection mechanisms to quickly identify and recover from deadlock conditions. Employ strict access controls to limit which users or processes can interact with Bluetooth devices or invoke ioctl calls on RFCOMM sockets, reducing the risk of accidental or malicious triggering of the deadlock. For embedded or IoT devices, coordinate with device vendors to ensure timely firmware or kernel updates. Finally, maintain comprehensive logging and monitoring of Bluetooth subsystem activity to detect unusual behavior that might indicate attempts to exploit this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2024-50044: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change rfcomm_sk_state_change attempts to use sock_lock so it must never be called with it locked but rfcomm_sock_ioctl always attempt to lock it causing the following trace: ====================================================== WARNING: possible circular locking dependency detected 6.8.0-syzkaller-08951-gfe46a7dd189e #0 Not tainted ------------------------------------------------------ syz-executor386/5093 is trying to acquire lock: ffff88807c396258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1671 [inline] ffff88807c396258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: rfcomm_sk_state_change+0x5b/0x310 net/bluetooth/rfcomm/sock.c:73 but task is already holding lock: ffff88807badfd28 (&d->lock){+.+.}-{3:3}, at: __rfcomm_dlc_close+0x226/0x6a0 net/bluetooth/rfcomm/core.c:491
AI-Powered Analysis
Technical Analysis
CVE-2024-50044 is a vulnerability identified in the Linux kernel's Bluetooth RFCOMM protocol implementation. Specifically, the issue arises from a potential deadlock condition in the function rfcomm_sk_state_change. This function attempts to acquire a socket lock (sock_lock), but it must not be called when this lock is already held. However, rfcomm_sock_ioctl, another function in the RFCOMM stack, always attempts to acquire this lock before calling rfcomm_sk_state_change. This leads to a circular locking dependency, as evidenced by kernel warnings about possible deadlocks and circular locking dependencies. The trace shows that a task tries to acquire the sk_lock while already holding another lock (&d->lock), causing a deadlock scenario. This deadlock can freeze or hang the Bluetooth RFCOMM socket operations, potentially impacting system stability or availability. The vulnerability affects multiple versions of the Linux kernel, as indicated by the repeated commit hashes, and was published on October 21, 2024. No CVSS score has been assigned yet, and there are no known exploits in the wild. The root cause is a synchronization flaw in the Bluetooth RFCOMM socket state management, which can cause kernel-level deadlocks during Bluetooth communication over RFCOMM channels.
Potential Impact
For European organizations, this vulnerability could have significant operational impacts, especially for those relying on Linux-based systems with Bluetooth functionality. The deadlock can cause system hangs or degraded performance in devices using Bluetooth RFCOMM, which is commonly used for serial port emulation over Bluetooth. This may affect embedded systems, IoT devices, industrial control systems, and enterprise Linux servers or workstations that utilize Bluetooth for device communication or management. In critical infrastructure sectors such as manufacturing, healthcare, transportation, and telecommunications, where Linux is prevalent and Bluetooth connectivity is used, this could lead to service interruptions or degraded device functionality. Although this vulnerability does not directly lead to privilege escalation or data leakage, the availability impact due to deadlocks can disrupt business operations and potentially delay critical processes. The lack of known exploits reduces immediate risk, but the presence of a kernel-level deadlock vulnerability means that attackers or even benign processes could trigger system instability, which is a concern for high-availability environments.
Mitigation Recommendations
To mitigate this vulnerability, organizations should promptly apply the official Linux kernel patches once they are released by the Linux maintainers. Until patches are available, consider disabling Bluetooth RFCOMM functionality if it is not essential, especially on critical systems. For systems where Bluetooth is required, monitor kernel updates closely and test patches in staging environments before deployment. Additionally, implement kernel crash and hang detection mechanisms to quickly identify and recover from deadlock conditions. Employ strict access controls to limit which users or processes can interact with Bluetooth devices or invoke ioctl calls on RFCOMM sockets, reducing the risk of accidental or malicious triggering of the deadlock. For embedded or IoT devices, coordinate with device vendors to ensure timely firmware or kernel updates. Finally, maintain comprehensive logging and monitoring of Bluetooth subsystem activity to detect unusual behavior that might indicate attempts to exploit this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-10-21T12:17:06.071Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9824c4522896dcbdfdaa
Added to database: 5/21/2025, 9:08:52 AM
Last enriched: 6/28/2025, 4:40:36 PM
Last updated: 8/18/2025, 11:32:19 PM
Views: 17
Related Threats
CVE-2025-8567: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in posimyththemes Nexter Blocks – WordPress Gutenberg Blocks & 1000+ Starter Templates
MediumCVE-2025-41689: CWE-306 Missing Authentication for Critical Function in Wiesemann & Theis Motherbox 3
MediumCVE-2025-41685: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in SMA ennexos.sunnyportal.com
MediumCVE-2025-8723: CWE-94 Improper Control of Generation of Code ('Code Injection') in mecanik Cloudflare Image Resizing – Optimize & Accelerate Your Images
CriticalCVE-2025-8622: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in webaware Flexible Map
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.