CVE-2024-50044

Source
https://cve.org/CVERecord?id=CVE-2024-50044
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50044.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-50044
Downstream
Related
Published
2024-10-21T19:39:42.430Z
Modified
2026-03-11T07:52:13.879956Z
Summary
Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change
Details

In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: RFCOMM: FIX possible deadlock in rfcommskstate_change

rfcommskstatechange attempts to use socklock so it must never be called with it locked but rfcommsockioctl always attempt to lock it causing the following trace:

====================================================== WARNING: possible circular locking dependency detected

6.8.0-syzkaller-08951-gfe46a7dd189e #0 Not tainted

syz-executor386/5093 is trying to acquire lock: ffff88807c396258 (sklock-AFBLUETOOTH-BTPROTORFCOMM){+.+.}-{0:0}, at: locksock include/net/sock.h:1671 [inline] ffff88807c396258 (sklock-AFBLUETOOTH-BTPROTORFCOMM){+.+.}-{0:0}, at: rfcommskstatechange+0x5b/0x310 net/bluetooth/rfcomm/sock.c:73

but task is already holding lock: ffff88807badfd28 (&d->lock){+.+.}-{3:3}, at: __rfcommdlcclose+0x226/0x6a0 net/bluetooth/rfcomm/core.c:491

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50044.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3241ad820dbb172021e0268b5611031991431626
Fixed
b77b3fb12fd483cae7c28648903b1d8a6b275f01
Fixed
869c6ee62ab8f01bf2419e45326642be5c9b670a
Fixed
ef44274dae9b0a90d1a97ce8b242a3b8243a7745
Fixed
496b2ab0fd10f205e08909a125485fdc98843dbe
Fixed
ced98072d3511b232ae1d3347945f35f30c0e303
Fixed
38b2d5a57d125e1c17661b8308c0240c4a43b534
Fixed
4cb9807c9b53bf1e5560420d26f319f528b50268
Fixed
08d1914293dae38350b8088980e59fbc699a72fe

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50044.json"