Skip to main content

CVE-2024-53238: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-53238cvecve-2024-53238
Published: Fri Dec 27 2024 (12/27/2024, 13:50:24 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btmtk: adjust the position to init iso data anchor MediaTek iso data anchor init should be moved to where MediaTek claims iso data interface. If there is an unexpected BT usb disconnect during setup flow, it will cause a NULL pointer crash issue when releasing iso anchor since the anchor wasn't been init yet. Adjust the position to do iso data anchor init. [ 17.137991] pc : usb_kill_anchored_urbs+0x60/0x168 [ 17.137998] lr : usb_kill_anchored_urbs+0x44/0x168 [ 17.137999] sp : ffffffc0890cb5f0 [ 17.138000] x29: ffffffc0890cb5f0 x28: ffffff80bb6c2e80 [ 17.144081] gpio gpiochip0: registered chardev handle for 1 lines [ 17.148421] x27: 0000000000000000 [ 17.148422] x26: ffffffd301ff4298 x25: 0000000000000003 x24: 00000000000000f0 [ 17.148424] x23: 0000000000000000 x22: 00000000ffffffff x21: 0000000000000001 [ 17.148425] x20: ffffffffffffffd8 x19: ffffff80c0f25560 x18: 0000000000000000 [ 17.148427] x17: ffffffd33864e408 x16: ffffffd33808f7c8 x15: 0000000000200000 [ 17.232789] x14: e0cd73cf80ffffff x13: 50f2137c0a0338c9 x12: 0000000000000001 [ 17.239912] x11: 0000000080150011 x10: 0000000000000002 x9 : 0000000000000001 [ 17.247035] x8 : 0000000000000000 x7 : 0000000000008080 x6 : 8080000000000000 [ 17.254158] x5 : ffffffd33808ebc0 x4 : fffffffe033dcf20 x3 : 0000000080150011 [ 17.261281] x2 : ffffff8087a91400 x1 : 0000000000000000 x0 : ffffff80c0f25588 [ 17.268404] Call trace: [ 17.270841] usb_kill_anchored_urbs+0x60/0x168 [ 17.275274] btusb_mtk_release_iso_intf+0x2c/0xd8 [btusb (HASH:5afe 6)] [ 17.284226] btusb_mtk_disconnect+0x14/0x28 [btusb (HASH:5afe 6)] [ 17.292652] btusb_disconnect+0x70/0x140 [btusb (HASH:5afe 6)] [ 17.300818] usb_unbind_interface+0xc4/0x240 [ 17.305079] device_release_driver_internal+0x18c/0x258 [ 17.310296] device_release_driver+0x1c/0x30 [ 17.314557] bus_remove_device+0x140/0x160 [ 17.318643] device_del+0x1c0/0x330 [ 17.322121] usb_disable_device+0x80/0x180 [ 17.326207] usb_disconnect+0xec/0x300 [ 17.329948] hub_quiesce+0x80/0xd0 [ 17.333339] hub_disconnect+0x44/0x190 [ 17.337078] usb_unbind_interface+0xc4/0x240 [ 17.341337] device_release_driver_internal+0x18c/0x258 [ 17.346551] device_release_driver+0x1c/0x30 [ 17.350810] usb_driver_release_interface+0x70/0x88 [ 17.355677] proc_ioctl+0x13c/0x228 [ 17.359157] proc_ioctl_default+0x50/0x80 [ 17.363155] usbdev_ioctl+0x830/0xd08 [ 17.366808] __arm64_sys_ioctl+0x94/0xd0 [ 17.370723] invoke_syscall+0x6c/0xf8 [ 17.374377] el0_svc_common+0x84/0xe0 [ 17.378030] do_el0_svc+0x20/0x30 [ 17.381334] el0_svc+0x34/0x60 [ 17.384382] el0t_64_sync_handler+0x88/0xf0 [ 17.388554] el0t_64_sync+0x180/0x188 [ 17.392208] Code: f9400677 f100a2f4 54fffea0 d503201f (b8350288) [ 17.398289] ---[ end trace 0000000000000000 ]---

AI-Powered Analysis

AILast updated: 06/28/2025, 11:09:50 UTC

Technical Analysis

CVE-2024-53238 is a vulnerability identified in the Linux kernel's Bluetooth subsystem, specifically within the MediaTek (btmtk) USB driver implementation. The flaw arises from improper initialization of the ISO data anchor during the Bluetooth USB setup flow. The MediaTek driver initializes the ISO data anchor at an incorrect point in the device setup sequence. If an unexpected Bluetooth USB disconnect occurs during this setup, the ISO data anchor remains uninitialized. Subsequently, when the driver attempts to release this anchor during cleanup, it dereferences a NULL pointer, causing a kernel crash (NULL pointer dereference). This results in a denial-of-service (DoS) condition due to the kernel panic or crash. The provided kernel trace confirms the crash occurs in the usb_kill_anchored_urbs function, called during the btusb_mtk_release_iso_intf and btusb_mtk_disconnect routines. This vulnerability affects Linux kernel versions containing the affected MediaTek Bluetooth USB driver code, as identified by the commit hashes referenced. No public exploits are known at this time, and no CVSS score has been assigned. The root cause is a race condition or logic error in the driver’s handling of USB disconnect events during ISO data interface initialization. This flaw is specific to MediaTek Bluetooth USB devices running on Linux systems, which are common in embedded devices, laptops, and some IoT hardware. The vulnerability does not appear to allow privilege escalation or arbitrary code execution but can cause system instability or denial of service by crashing the kernel when the Bluetooth device is disconnected unexpectedly during initialization.

Potential Impact

For European organizations, the primary impact of CVE-2024-53238 is potential system instability or denial of service on Linux-based systems using MediaTek Bluetooth USB devices. This includes laptops, desktops, embedded systems, and IoT devices prevalent in enterprise environments. A kernel crash can disrupt critical services, cause data loss, or require system reboots, impacting availability. Organizations relying on Linux for networking, industrial control, or endpoint devices with MediaTek Bluetooth hardware may experience interruptions. While this vulnerability does not directly expose sensitive data or allow remote code execution, the resulting denial of service could be exploited as part of a broader attack chain to degrade system reliability or availability. In sectors such as manufacturing, healthcare, or telecommunications, where Linux-based embedded devices are common, this could lead to operational disruptions. Additionally, the vulnerability could be triggered by local users or automated processes that cause unexpected Bluetooth USB disconnects, potentially as a vector for sabotage or accidental outages. Given the widespread use of Linux in European IT infrastructure and the growing adoption of MediaTek Bluetooth components, the risk of impact is moderate, especially in environments with less rigorous device management or patching practices.

Mitigation Recommendations

To mitigate CVE-2024-53238, European organizations should: 1) Apply the latest Linux kernel updates that include the patch fixing the MediaTek Bluetooth USB driver initialization sequence. Regularly monitor kernel security advisories and update promptly. 2) Implement device management policies to control and monitor Bluetooth device connections, minimizing unexpected disconnects during device initialization. 3) For critical systems, consider disabling Bluetooth USB devices if not required, or restrict their use to trusted devices only. 4) Employ kernel crash monitoring and automated recovery mechanisms to reduce downtime caused by potential crashes. 5) Conduct thorough testing of Bluetooth device behavior in controlled environments to detect and prevent unexpected disconnect scenarios. 6) Collaborate with hardware vendors to ensure firmware and driver compatibility and security updates are applied. 7) Use endpoint security solutions capable of detecting abnormal device disconnections or kernel crashes related to Bluetooth subsystems. These targeted measures go beyond generic advice by focusing on the specific driver and device behavior that triggers the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-11-19T17:17:25.026Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9823c4522896dcbdf069

Added to database: 5/21/2025, 9:08:51 AM

Last enriched: 6/28/2025, 11:09:50 AM

Last updated: 8/11/2025, 6:37:39 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats