CVE-2024-54460
📋 TL;DR
This CVE describes a circular locking dependency vulnerability in the Linux kernel's Bluetooth ISO (isochronous) subsystem. The issue could lead to a kernel deadlock when handling Bluetooth LE periodic advertising reports, potentially causing system instability or denial of service. Systems running affected Linux kernel versions with Bluetooth enabled are vulnerable.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
System deadlock requiring hard reboot, causing denial of service and potential data loss in active Bluetooth connections.
Likely Case
Bluetooth functionality disruption, dropped connections, or system instability when handling specific Bluetooth LE advertising events.
If Mitigated
Minor performance impact during Bluetooth operations with no security compromise.
🎯 Exploit Status
Exploitation requires ability to send specific Bluetooth LE advertising packets and timing to trigger the deadlock condition.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in kernel commit 168e28305b871d8ec604a8f51f35467b8d7ba05b and c541d7b5e17987ed330798b07d4ad508859c1c93
Vendor Advisory: https://git.kernel.org/stable/c/168e28305b871d8ec604a8f51f35467b8d7ba05b
Restart Required: Yes
Instructions:
1. Update to a kernel version containing the fix commit. 2. Check your distribution's security advisories for backported patches. 3. Reboot the system after kernel update.
🔧 Temporary Workarounds
Disable Bluetooth functionality
linuxCompletely disable Bluetooth to prevent the vulnerability from being triggered
systemctl stop bluetooth
systemctl disable bluetooth
rfkill block bluetooth
Disable Bluetooth LE ISO features
linuxDisable specific Bluetooth LE isochronous features if supported by your Bluetooth stack
🧯 If You Can't Patch
- Implement network segmentation to isolate Bluetooth traffic
- Monitor system logs for deadlock warnings and implement alerting
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if it contains the vulnerable code. Look for kernel logs containing 'circular locking dependency' warnings related to Bluetooth ISO.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes the fix commits or check that circular locking warnings no longer appear in dmesg during Bluetooth operations.
📡 Detection & Monitoring
Log Indicators:
- Kernel logs showing 'circular locking dependency detected' with Bluetooth ISO references
- System becoming unresponsive during Bluetooth operations
Network Indicators:
- Unusual Bluetooth LE advertising patterns
- Bluetooth connection failures
SIEM Query:
source="kernel" AND "circular locking" AND "bluetooth"