๐Ÿ” CVE Alert

CVE-2024-53207

MEDIUM 5.5

Bluetooth: MGMT: Fix possible deadlocks

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix possible deadlocks This fixes possible deadlocks like the following caused by hci_cmd_sync_dequeue causing the destroy function to run: INFO: task kworker/u19:0:143 blocked for more than 120 seconds. Tainted: G W O 6.8.0-2024-03-19-intel-next-iLS-24ww14 #1 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/u19:0 state:D stack:0 pid:143 tgid:143 ppid:2 flags:0x00004000 Workqueue: hci0 hci_cmd_sync_work [bluetooth] Call Trace: <TASK> __schedule+0x374/0xaf0 schedule+0x3c/0xf0 schedule_preempt_disabled+0x1c/0x30 __mutex_lock.constprop.0+0x3ef/0x7a0 __mutex_lock_slowpath+0x13/0x20 mutex_lock+0x3c/0x50 mgmt_set_connectable_complete+0xa4/0x150 [bluetooth] ? kfree+0x211/0x2a0 hci_cmd_sync_dequeue+0xae/0x130 [bluetooth] ? __pfx_cmd_complete_rsp+0x10/0x10 [bluetooth] cmd_complete_rsp+0x26/0x80 [bluetooth] mgmt_pending_foreach+0x4d/0x70 [bluetooth] __mgmt_power_off+0x8d/0x180 [bluetooth] ? _raw_spin_unlock_irq+0x23/0x40 hci_dev_close_sync+0x445/0x5b0 [bluetooth] hci_set_powered_sync+0x149/0x250 [bluetooth] set_powered_sync+0x24/0x60 [bluetooth] hci_cmd_sync_work+0x90/0x150 [bluetooth] process_one_work+0x13e/0x300 worker_thread+0x2f7/0x420 ? __pfx_worker_thread+0x10/0x10 kthread+0x107/0x140 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x3d/0x60 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1b/0x30 </TASK>

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 27, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
19b40ca62607cef78369549d1af091f2fd558931 < c3f594a3473d6429a0bcf2004cb2885368741b79 4883296505aa7e4863c6869b689afb6005633b23 < 5703fb1d85f653e35b327b14de4db7da239e4fd9 8c3f7943a29145d8a2d8e24893762f7673323eae < 6a25ce9b4af6dc26ee2b9c32d6bd37620bf9739e f53e1c9c726d83092167f2226f32bd3b73f26c21 < cac34e44281f1f1bd842adbbcfe3ef9ff0905111 f53e1c9c726d83092167f2226f32bd3b73f26c21 < a66dfaf18fd61bb75ef8cee83db46b2aadf153d0 0cc47233af35fb5f10b5e6a027cb4ccd480caf9a
Linux / Linux
6.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/c3f594a3473d6429a0bcf2004cb2885368741b79 git.kernel.org: https://git.kernel.org/stable/c/5703fb1d85f653e35b327b14de4db7da239e4fd9 git.kernel.org: https://git.kernel.org/stable/c/6a25ce9b4af6dc26ee2b9c32d6bd37620bf9739e git.kernel.org: https://git.kernel.org/stable/c/cac34e44281f1f1bd842adbbcfe3ef9ff0905111 git.kernel.org: https://git.kernel.org/stable/c/a66dfaf18fd61bb75ef8cee83db46b2aadf153d0 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html