CVE-2024-50044: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change rfcomm_sk_state_change attempts to use sock_lock so it must never be called with it locked but rfcomm_sock_ioctl always attempt to lock it causing the following trace: ====================================================== WARNING: possible circular locking dependency detected 6.8.0-syzkaller-08951-gfe46a7dd189e #0 Not tainted ------------------------------------------------------ syz-executor386/5093 is trying to acquire lock: ffff88807c396258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1671 [inline] ffff88807c396258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: rfcomm_sk_state_change+0x5b/0x310 net/bluetooth/rfcomm/sock.c:73 but task is already holding lock: ffff88807badfd28 (&d->lock){+.+.}-{3:3}, at: __rfcomm_dlc_close+0x226/0x6a0 net/bluetooth/rfcomm/core.c:491
AI Analysis
Technical Summary
CVE-2024-50044 is a vulnerability identified in the Linux kernel's Bluetooth RFCOMM protocol implementation. Specifically, the issue arises from a potential deadlock condition in the function rfcomm_sk_state_change. This function attempts to acquire a socket lock (sock_lock), but it must not be called when this lock is already held. However, rfcomm_sock_ioctl, another function in the RFCOMM stack, always attempts to acquire this lock before calling rfcomm_sk_state_change. This leads to a circular locking dependency, as evidenced by kernel warnings about possible deadlocks and circular locking dependencies. The trace shows that a task tries to acquire the sk_lock while already holding another lock (&d->lock), causing a deadlock scenario. This deadlock can freeze or hang the Bluetooth RFCOMM socket operations, potentially impacting system stability or availability. The vulnerability affects multiple versions of the Linux kernel, as indicated by the repeated commit hashes, and was published on October 21, 2024. No CVSS score has been assigned yet, and there are no known exploits in the wild. The root cause is a synchronization flaw in the Bluetooth RFCOMM socket state management, which can cause kernel-level deadlocks during Bluetooth communication over RFCOMM channels.
Potential Impact
For European organizations, this vulnerability could have significant operational impacts, especially for those relying on Linux-based systems with Bluetooth functionality. The deadlock can cause system hangs or degraded performance in devices using Bluetooth RFCOMM, which is commonly used for serial port emulation over Bluetooth. This may affect embedded systems, IoT devices, industrial control systems, and enterprise Linux servers or workstations that utilize Bluetooth for device communication or management. In critical infrastructure sectors such as manufacturing, healthcare, transportation, and telecommunications, where Linux is prevalent and Bluetooth connectivity is used, this could lead to service interruptions or degraded device functionality. Although this vulnerability does not directly lead to privilege escalation or data leakage, the availability impact due to deadlocks can disrupt business operations and potentially delay critical processes. The lack of known exploits reduces immediate risk, but the presence of a kernel-level deadlock vulnerability means that attackers or even benign processes could trigger system instability, which is a concern for high-availability environments.
Mitigation Recommendations
To mitigate this vulnerability, organizations should promptly apply the official Linux kernel patches once they are released by the Linux maintainers. Until patches are available, consider disabling Bluetooth RFCOMM functionality if it is not essential, especially on critical systems. For systems where Bluetooth is required, monitor kernel updates closely and test patches in staging environments before deployment. Additionally, implement kernel crash and hang detection mechanisms to quickly identify and recover from deadlock conditions. Employ strict access controls to limit which users or processes can interact with Bluetooth devices or invoke ioctl calls on RFCOMM sockets, reducing the risk of accidental or malicious triggering of the deadlock. For embedded or IoT devices, coordinate with device vendors to ensure timely firmware or kernel updates. Finally, maintain comprehensive logging and monitoring of Bluetooth subsystem activity to detect unusual behavior that might indicate attempts to exploit this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2024-50044: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change rfcomm_sk_state_change attempts to use sock_lock so it must never be called with it locked but rfcomm_sock_ioctl always attempt to lock it causing the following trace: ====================================================== WARNING: possible circular locking dependency detected 6.8.0-syzkaller-08951-gfe46a7dd189e #0 Not tainted ------------------------------------------------------ syz-executor386/5093 is trying to acquire lock: ffff88807c396258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1671 [inline] ffff88807c396258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: rfcomm_sk_state_change+0x5b/0x310 net/bluetooth/rfcomm/sock.c:73 but task is already holding lock: ffff88807badfd28 (&d->lock){+.+.}-{3:3}, at: __rfcomm_dlc_close+0x226/0x6a0 net/bluetooth/rfcomm/core.c:491
AI-Powered Analysis
Technical Analysis
CVE-2024-50044 is a vulnerability identified in the Linux kernel's Bluetooth RFCOMM protocol implementation. Specifically, the issue arises from a potential deadlock condition in the function rfcomm_sk_state_change. This function attempts to acquire a socket lock (sock_lock), but it must not be called when this lock is already held. However, rfcomm_sock_ioctl, another function in the RFCOMM stack, always attempts to acquire this lock before calling rfcomm_sk_state_change. This leads to a circular locking dependency, as evidenced by kernel warnings about possible deadlocks and circular locking dependencies. The trace shows that a task tries to acquire the sk_lock while already holding another lock (&d->lock), causing a deadlock scenario. This deadlock can freeze or hang the Bluetooth RFCOMM socket operations, potentially impacting system stability or availability. The vulnerability affects multiple versions of the Linux kernel, as indicated by the repeated commit hashes, and was published on October 21, 2024. No CVSS score has been assigned yet, and there are no known exploits in the wild. The root cause is a synchronization flaw in the Bluetooth RFCOMM socket state management, which can cause kernel-level deadlocks during Bluetooth communication over RFCOMM channels.
Potential Impact
For European organizations, this vulnerability could have significant operational impacts, especially for those relying on Linux-based systems with Bluetooth functionality. The deadlock can cause system hangs or degraded performance in devices using Bluetooth RFCOMM, which is commonly used for serial port emulation over Bluetooth. This may affect embedded systems, IoT devices, industrial control systems, and enterprise Linux servers or workstations that utilize Bluetooth for device communication or management. In critical infrastructure sectors such as manufacturing, healthcare, transportation, and telecommunications, where Linux is prevalent and Bluetooth connectivity is used, this could lead to service interruptions or degraded device functionality. Although this vulnerability does not directly lead to privilege escalation or data leakage, the availability impact due to deadlocks can disrupt business operations and potentially delay critical processes. The lack of known exploits reduces immediate risk, but the presence of a kernel-level deadlock vulnerability means that attackers or even benign processes could trigger system instability, which is a concern for high-availability environments.
Mitigation Recommendations
To mitigate this vulnerability, organizations should promptly apply the official Linux kernel patches once they are released by the Linux maintainers. Until patches are available, consider disabling Bluetooth RFCOMM functionality if it is not essential, especially on critical systems. For systems where Bluetooth is required, monitor kernel updates closely and test patches in staging environments before deployment. Additionally, implement kernel crash and hang detection mechanisms to quickly identify and recover from deadlock conditions. Employ strict access controls to limit which users or processes can interact with Bluetooth devices or invoke ioctl calls on RFCOMM sockets, reducing the risk of accidental or malicious triggering of the deadlock. For embedded or IoT devices, coordinate with device vendors to ensure timely firmware or kernel updates. Finally, maintain comprehensive logging and monitoring of Bluetooth subsystem activity to detect unusual behavior that might indicate attempts to exploit this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-10-21T12:17:06.071Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9824c4522896dcbdfdaa
Added to database: 5/21/2025, 9:08:52 AM
Last enriched: 6/28/2025, 4:40:36 PM
Last updated: 10/16/2025, 2:07:07 AM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion
HighCVE-2025-11683: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in TODDR YAML::Syck
UnknownCVE-2025-11619: CWE-295 Improper Certificate Validation in Devolutions Devolutions Server
HighCVE-2025-43313: An app may be able to access sensitive user data in Apple macOS
MediumCVE-2025-43282: An app may be able to cause unexpected system termination in Apple iPadOS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.