CVE-2024-53207
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/12/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
Bluetooth: MGMT: Fix possible deadlocks<br />
<br />
This fixes possible deadlocks like the following caused by<br />
hci_cmd_sync_dequeue causing the destroy function to run:<br />
<br />
INFO: task kworker/u19:0:143 blocked for more than 120 seconds.<br />
Tainted: G W O 6.8.0-2024-03-19-intel-next-iLS-24ww14 #1<br />
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.<br />
task:kworker/u19:0 state:D stack:0 pid:143 tgid:143 ppid:2 flags:0x00004000<br />
Workqueue: hci0 hci_cmd_sync_work [bluetooth]<br />
Call Trace:<br />
<br />
__schedule+0x374/0xaf0<br />
schedule+0x3c/0xf0<br />
schedule_preempt_disabled+0x1c/0x30<br />
__mutex_lock.constprop.0+0x3ef/0x7a0<br />
__mutex_lock_slowpath+0x13/0x20<br />
mutex_lock+0x3c/0x50<br />
mgmt_set_connectable_complete+0xa4/0x150 [bluetooth]<br />
? kfree+0x211/0x2a0<br />
hci_cmd_sync_dequeue+0xae/0x130 [bluetooth]<br />
? __pfx_cmd_complete_rsp+0x10/0x10 [bluetooth]<br />
cmd_complete_rsp+0x26/0x80 [bluetooth]<br />
mgmt_pending_foreach+0x4d/0x70 [bluetooth]<br />
__mgmt_power_off+0x8d/0x180 [bluetooth]<br />
? _raw_spin_unlock_irq+0x23/0x40<br />
hci_dev_close_sync+0x445/0x5b0 [bluetooth]<br />
hci_set_powered_sync+0x149/0x250 [bluetooth]<br />
set_powered_sync+0x24/0x60 [bluetooth]<br />
hci_cmd_sync_work+0x90/0x150 [bluetooth]<br />
process_one_work+0x13e/0x300<br />
worker_thread+0x2f7/0x420<br />
? __pfx_worker_thread+0x10/0x10<br />
kthread+0x107/0x140<br />
? __pfx_kthread+0x10/0x10<br />
ret_from_fork+0x3d/0x60<br />
? __pfx_kthread+0x10/0x10<br />
ret_from_fork_asm+0x1b/0x30<br />
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.55 (including) | 6.6.64 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.10.14 (including) | 6.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11.3 (including) | 6.11.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12 (including) | 6.12.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/5703fb1d85f653e35b327b14de4db7da239e4fd9
- https://git.kernel.org/stable/c/6a25ce9b4af6dc26ee2b9c32d6bd37620bf9739e
- https://git.kernel.org/stable/c/a66dfaf18fd61bb75ef8cee83db46b2aadf153d0
- https://git.kernel.org/stable/c/c3f594a3473d6429a0bcf2004cb2885368741b79
- https://git.kernel.org/stable/c/cac34e44281f1f1bd842adbbcfe3ef9ff0905111
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html



