๐Ÿ” CVE Alert

CVE-2024-50044

UNKNOWN 0.0

Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change rfcomm_sk_state_change attempts to use sock_lock so it must never be called with it locked but rfcomm_sock_ioctl always attempt to lock it causing the following trace: ====================================================== WARNING: possible circular locking dependency detected 6.8.0-syzkaller-08951-gfe46a7dd189e #0 Not tainted ------------------------------------------------------ syz-executor386/5093 is trying to acquire lock: ffff88807c396258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1671 [inline] ffff88807c396258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: rfcomm_sk_state_change+0x5b/0x310 net/bluetooth/rfcomm/sock.c:73 but task is already holding lock: ffff88807badfd28 (&d->lock){+.+.}-{3:3}, at: __rfcomm_dlc_close+0x226/0x6a0 net/bluetooth/rfcomm/core.c:491

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
3241ad820dbb172021e0268b5611031991431626 < b77b3fb12fd483cae7c28648903b1d8a6b275f01 3241ad820dbb172021e0268b5611031991431626 < 869c6ee62ab8f01bf2419e45326642be5c9b670a 3241ad820dbb172021e0268b5611031991431626 < ef44274dae9b0a90d1a97ce8b242a3b8243a7745 3241ad820dbb172021e0268b5611031991431626 < 496b2ab0fd10f205e08909a125485fdc98843dbe 3241ad820dbb172021e0268b5611031991431626 < ced98072d3511b232ae1d3347945f35f30c0e303 3241ad820dbb172021e0268b5611031991431626 < 38b2d5a57d125e1c17661b8308c0240c4a43b534 3241ad820dbb172021e0268b5611031991431626 < 4cb9807c9b53bf1e5560420d26f319f528b50268 3241ad820dbb172021e0268b5611031991431626 < 08d1914293dae38350b8088980e59fbc699a72fe
Linux / Linux
2.6.27

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/b77b3fb12fd483cae7c28648903b1d8a6b275f01 git.kernel.org: https://git.kernel.org/stable/c/869c6ee62ab8f01bf2419e45326642be5c9b670a git.kernel.org: https://git.kernel.org/stable/c/ef44274dae9b0a90d1a97ce8b242a3b8243a7745 git.kernel.org: https://git.kernel.org/stable/c/496b2ab0fd10f205e08909a125485fdc98843dbe git.kernel.org: https://git.kernel.org/stable/c/ced98072d3511b232ae1d3347945f35f30c0e303 git.kernel.org: https://git.kernel.org/stable/c/38b2d5a57d125e1c17661b8308c0240c4a43b534 git.kernel.org: https://git.kernel.org/stable/c/4cb9807c9b53bf1e5560420d26f319f528b50268 git.kernel.org: https://git.kernel.org/stable/c/08d1914293dae38350b8088980e59fbc699a72fe lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-355557.html