CVE-2024-50077: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ISO: Fix multiple init when debugfs is disabled If bt_debugfs is not created successfully, which happens if either CONFIG_DEBUG_FS or CONFIG_DEBUG_FS_ALLOW_ALL is unset, then iso_init() returns early and does not set iso_inited to true. This means that a subsequent call to iso_init() will result in duplicate calls to proto_register(), bt_sock_register(), etc. With CONFIG_LIST_HARDENED and CONFIG_BUG_ON_DATA_CORRUPTION enabled, the duplicate call to proto_register() triggers this BUG(): list_add double add: new=ffffffffc0b280d0, prev=ffffffffbab56250, next=ffffffffc0b280d0. ------------[ cut here ]------------ kernel BUG at lib/list_debug.c:35! Oops: invalid opcode: 0000 [#1] PREEMPT SMP PTI CPU: 2 PID: 887 Comm: bluetoothd Not tainted 6.10.11-1-ao-desktop #1 RIP: 0010:__list_add_valid_or_report+0x9a/0xa0 ... __list_add_valid_or_report+0x9a/0xa0 proto_register+0x2b5/0x340 iso_init+0x23/0x150 [bluetooth] set_iso_socket_func+0x68/0x1b0 [bluetooth] kmem_cache_free+0x308/0x330 hci_sock_sendmsg+0x990/0x9e0 [bluetooth] __sock_sendmsg+0x7b/0x80 sock_write_iter+0x9a/0x110 do_iter_readv_writev+0x11d/0x220 vfs_writev+0x180/0x3e0 do_writev+0xca/0x100 ... This change removes the early return. The check for iso_debugfs being NULL was unnecessary, it is always NULL when iso_inited is false.
AI Analysis
Technical Summary
CVE-2024-50077 is a vulnerability identified in the Linux kernel's Bluetooth ISO (Isochronous Channels) subsystem. The root cause lies in the initialization logic of the ISO Bluetooth protocol when debugfs support is disabled (i.e., when CONFIG_DEBUG_FS or CONFIG_DEBUG_FS_ALLOW_ALL kernel configuration options are unset). Specifically, the iso_init() function returns early without setting the iso_inited flag to true if the bt_debugfs interface is not created successfully. This leads to a scenario where iso_init() can be called multiple times, resulting in duplicate registrations of protocol handlers and socket types via proto_register() and bt_sock_register(). When the kernel is compiled with CONFIG_LIST_HARDENED and CONFIG_BUG_ON_DATA_CORRUPTION enabled, these duplicate registrations cause a kernel BUG due to a double addition in the linked list management (list_add double add). This triggers a kernel panic (Oops) with an invalid opcode exception, effectively crashing the system or the Bluetooth daemon (bluetoothd). The patch removes the early return in iso_init(), ensuring iso_inited is set properly and preventing duplicate initialization calls. The vulnerability affects Linux kernel versions prior to the fix, including 6.10.11-1-ao-desktop as referenced. No known exploits are currently reported in the wild. The issue is a stability and availability concern rather than a direct confidentiality or integrity breach, as it leads to denial of service via kernel crash when Bluetooth ISO channels are initialized improperly under specific kernel configurations.
Potential Impact
For European organizations, this vulnerability primarily poses a risk to system availability and operational stability, especially for those relying on Linux-based systems with Bluetooth ISO support enabled. Critical infrastructure, industrial control systems, and enterprise environments that utilize Bluetooth for device communication or IoT integration could experience unexpected system crashes or service interruptions. This could disrupt business operations, particularly in sectors such as manufacturing, healthcare, transportation, and telecommunications where Linux servers or embedded devices are prevalent. Although the vulnerability does not directly expose data confidentiality or integrity, the induced kernel panic could be exploited by attackers to cause denial of service, potentially as part of a larger attack chain. Organizations with hardened Linux kernels configured with CONFIG_LIST_HARDENED and CONFIG_BUG_ON_DATA_CORRUPTION are more susceptible to this crash, which may complicate incident response and recovery. The lack of known exploits reduces immediate risk, but the vulnerability's presence in widely used Linux kernels necessitates timely patching to maintain system reliability.
Mitigation Recommendations
1. Apply the official Linux kernel patch that removes the early return in iso_init() and ensures proper initialization of the Bluetooth ISO subsystem. Monitor Linux kernel updates and backport patches if using long-term support or custom kernels. 2. Review kernel configuration options: if feasible, enable CONFIG_DEBUG_FS or CONFIG_DEBUG_FS_ALLOW_ALL to avoid the early return condition, though this may not be practical in all environments. 3. For systems where patching is delayed, consider disabling Bluetooth ISO support or the Bluetooth subsystem entirely if it is not required, to eliminate the attack surface. 4. Implement robust monitoring for kernel Oops and system crashes related to Bluetooth services to detect exploitation attempts or instability early. 5. Harden system recovery procedures to quickly restore affected systems after a crash, including automated reboots and service restarts. 6. Coordinate with Linux distribution maintainers to ensure timely distribution of patched kernel versions and advisories. 7. For embedded or IoT devices using affected kernels, work with vendors to obtain firmware updates addressing this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2024-50077: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ISO: Fix multiple init when debugfs is disabled If bt_debugfs is not created successfully, which happens if either CONFIG_DEBUG_FS or CONFIG_DEBUG_FS_ALLOW_ALL is unset, then iso_init() returns early and does not set iso_inited to true. This means that a subsequent call to iso_init() will result in duplicate calls to proto_register(), bt_sock_register(), etc. With CONFIG_LIST_HARDENED and CONFIG_BUG_ON_DATA_CORRUPTION enabled, the duplicate call to proto_register() triggers this BUG(): list_add double add: new=ffffffffc0b280d0, prev=ffffffffbab56250, next=ffffffffc0b280d0. ------------[ cut here ]------------ kernel BUG at lib/list_debug.c:35! Oops: invalid opcode: 0000 [#1] PREEMPT SMP PTI CPU: 2 PID: 887 Comm: bluetoothd Not tainted 6.10.11-1-ao-desktop #1 RIP: 0010:__list_add_valid_or_report+0x9a/0xa0 ... __list_add_valid_or_report+0x9a/0xa0 proto_register+0x2b5/0x340 iso_init+0x23/0x150 [bluetooth] set_iso_socket_func+0x68/0x1b0 [bluetooth] kmem_cache_free+0x308/0x330 hci_sock_sendmsg+0x990/0x9e0 [bluetooth] __sock_sendmsg+0x7b/0x80 sock_write_iter+0x9a/0x110 do_iter_readv_writev+0x11d/0x220 vfs_writev+0x180/0x3e0 do_writev+0xca/0x100 ... This change removes the early return. The check for iso_debugfs being NULL was unnecessary, it is always NULL when iso_inited is false.
AI-Powered Analysis
Technical Analysis
CVE-2024-50077 is a vulnerability identified in the Linux kernel's Bluetooth ISO (Isochronous Channels) subsystem. The root cause lies in the initialization logic of the ISO Bluetooth protocol when debugfs support is disabled (i.e., when CONFIG_DEBUG_FS or CONFIG_DEBUG_FS_ALLOW_ALL kernel configuration options are unset). Specifically, the iso_init() function returns early without setting the iso_inited flag to true if the bt_debugfs interface is not created successfully. This leads to a scenario where iso_init() can be called multiple times, resulting in duplicate registrations of protocol handlers and socket types via proto_register() and bt_sock_register(). When the kernel is compiled with CONFIG_LIST_HARDENED and CONFIG_BUG_ON_DATA_CORRUPTION enabled, these duplicate registrations cause a kernel BUG due to a double addition in the linked list management (list_add double add). This triggers a kernel panic (Oops) with an invalid opcode exception, effectively crashing the system or the Bluetooth daemon (bluetoothd). The patch removes the early return in iso_init(), ensuring iso_inited is set properly and preventing duplicate initialization calls. The vulnerability affects Linux kernel versions prior to the fix, including 6.10.11-1-ao-desktop as referenced. No known exploits are currently reported in the wild. The issue is a stability and availability concern rather than a direct confidentiality or integrity breach, as it leads to denial of service via kernel crash when Bluetooth ISO channels are initialized improperly under specific kernel configurations.
Potential Impact
For European organizations, this vulnerability primarily poses a risk to system availability and operational stability, especially for those relying on Linux-based systems with Bluetooth ISO support enabled. Critical infrastructure, industrial control systems, and enterprise environments that utilize Bluetooth for device communication or IoT integration could experience unexpected system crashes or service interruptions. This could disrupt business operations, particularly in sectors such as manufacturing, healthcare, transportation, and telecommunications where Linux servers or embedded devices are prevalent. Although the vulnerability does not directly expose data confidentiality or integrity, the induced kernel panic could be exploited by attackers to cause denial of service, potentially as part of a larger attack chain. Organizations with hardened Linux kernels configured with CONFIG_LIST_HARDENED and CONFIG_BUG_ON_DATA_CORRUPTION are more susceptible to this crash, which may complicate incident response and recovery. The lack of known exploits reduces immediate risk, but the vulnerability's presence in widely used Linux kernels necessitates timely patching to maintain system reliability.
Mitigation Recommendations
1. Apply the official Linux kernel patch that removes the early return in iso_init() and ensures proper initialization of the Bluetooth ISO subsystem. Monitor Linux kernel updates and backport patches if using long-term support or custom kernels. 2. Review kernel configuration options: if feasible, enable CONFIG_DEBUG_FS or CONFIG_DEBUG_FS_ALLOW_ALL to avoid the early return condition, though this may not be practical in all environments. 3. For systems where patching is delayed, consider disabling Bluetooth ISO support or the Bluetooth subsystem entirely if it is not required, to eliminate the attack surface. 4. Implement robust monitoring for kernel Oops and system crashes related to Bluetooth services to detect exploitation attempts or instability early. 5. Harden system recovery procedures to quickly restore affected systems after a crash, including automated reboots and service restarts. 6. Coordinate with Linux distribution maintainers to ensure timely distribution of patched kernel versions and advisories. 7. For embedded or IoT devices using affected kernels, work with vendors to obtain firmware updates addressing this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-10-21T19:36:19.940Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9824c4522896dcbdfe90
Added to database: 5/21/2025, 9:08:52 AM
Last enriched: 6/28/2025, 4:56:57 PM
Last updated: 8/8/2025, 2:27:12 AM
Views: 17
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.