CVE-2024-53207

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-53207
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53207.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-53207
Downstream
Related
Published
2024-12-27T13:49:53.147Z
Modified
2025-11-27T19:35:26.556963Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Bluetooth: MGMT: Fix possible deadlocks
Details

In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: Fix possible deadlocks

This fixes possible deadlocks like the following caused by hcicmdsync_dequeue causing the destroy function to run:

INFO: task kworker/u19:0:143 blocked for more than 120 seconds. Tainted: G W O 6.8.0-2024-03-19-intel-next-iLS-24ww14 #1 "echo 0 > /proc/sys/kernel/hungtasktimeoutsecs" disables this message. task:kworker/u19:0 state:D stack:0 pid:143 tgid:143 ppid:2 flags:0x00004000 Workqueue: hci0 hcicmdsyncwork [bluetooth] Call Trace: <TASK> _schedule+0x374/0xaf0 schedule+0x3c/0xf0 schedulepreemptdisabled+0x1c/0x30 _mutexlock.constprop.0+0x3ef/0x7a0 _mutexlockslowpath+0x13/0x20 mutexlock+0x3c/0x50 mgmtsetconnectablecomplete+0xa4/0x150 [bluetooth] ? kfree+0x211/0x2a0 hcicmdsyncdequeue+0xae/0x130 [bluetooth] ? _pfxcmdcompletersp+0x10/0x10 [bluetooth] cmdcompletersp+0x26/0x80 [bluetooth] mgmtpendingforeach+0x4d/0x70 [bluetooth] _mgmtpoweroff+0x8d/0x180 [bluetooth] ? rawspinunlockirq+0x23/0x40 hcidevclosesync+0x445/0x5b0 [bluetooth] hcisetpoweredsync+0x149/0x250 [bluetooth] setpoweredsync+0x24/0x60 [bluetooth] hcicmdsyncwork+0x90/0x150 [bluetooth] processonework+0x13e/0x300 workerthread+0x2f7/0x420 ? _pfxworkerthread+0x10/0x10 kthread+0x107/0x140 ? _pfxkthread+0x10/0x10 retfromfork+0x3d/0x60 ? _pfxkthread+0x10/0x10 retfromforkasm+0x1b/0x30 </TASK>

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/blob/ee626f5d79d5817bb21d6f048dc0da4c4e383443/cves/2024/53xxx/CVE-2024-53207.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
19b40ca62607cef78369549d1af091f2fd558931
Fixed
c3f594a3473d6429a0bcf2004cb2885368741b79
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4883296505aa7e4863c6869b689afb6005633b23
Fixed
5703fb1d85f653e35b327b14de4db7da239e4fd9
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8c3f7943a29145d8a2d8e24893762f7673323eae
Fixed
6a25ce9b4af6dc26ee2b9c32d6bd37620bf9739e
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f53e1c9c726d83092167f2226f32bd3b73f26c21
Fixed
cac34e44281f1f1bd842adbbcfe3ef9ff0905111
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f53e1c9c726d83092167f2226f32bd3b73f26c21
Fixed
a66dfaf18fd61bb75ef8cee83db46b2aadf153d0
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
0cc47233af35fb5f10b5e6a027cb4ccd480caf9a

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6.64
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.11.11
Type
ECOSYSTEM
Events
Introduced
6.12.0
Fixed
6.12.2