CVE-2024-50044

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-50044
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50044.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-50044
Downstream
Related
Published
2024-10-21T20:15:17Z
Modified
2025-08-09T20:01:27Z
Severity
  • 3.3 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: RFCOMM: FIX possible deadlock in rfcommskstate_change

rfcommskstatechange attempts to use socklock so it must never be called with it locked but rfcommsockioctl always attempt to lock it causing the following trace:

====================================================== WARNING: possible circular locking dependency detected

6.8.0-syzkaller-08951-gfe46a7dd189e #0 Not tainted

syz-executor386/5093 is trying to acquire lock: ffff88807c396258 (sklock-AFBLUETOOTH-BTPROTORFCOMM){+.+.}-{0:0}, at: locksock include/net/sock.h:1671 [inline] ffff88807c396258 (sklock-AFBLUETOOTH-BTPROTORFCOMM){+.+.}-{0:0}, at: rfcommskstatechange+0x5b/0x310 net/bluetooth/rfcomm/sock.c:73

but task is already holding lock: ffff88807badfd28 (&d->lock){+.+.}-{3:3}, at: _rfcommdlc_close+0x226/0x6a0 net/bluetooth/rfcomm/core.c:491

References

Affected packages