CVE-2024-54460

5.5 MEDIUM

📋 TL;DR

This CVE describes a circular locking dependency vulnerability in the Linux kernel's Bluetooth ISO (isochronous) subsystem. The issue could lead to a kernel deadlock when handling Bluetooth LE periodic advertising reports, potentially causing system instability or denial of service. Systems running affected Linux kernel versions with Bluetooth enabled are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions containing the vulnerable code up to the fix commit (specific versions depend on distribution backports)
Operating Systems: Linux distributions with affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Bluetooth functionality enabled and Bluetooth LE ISO connections. The vulnerability is triggered during specific Bluetooth operations.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

System deadlock requiring hard reboot, causing denial of service and potential data loss in active Bluetooth connections.

🟠

Likely Case

Bluetooth functionality disruption, dropped connections, or system instability when handling specific Bluetooth LE advertising events.

🟢

If Mitigated

Minor performance impact during Bluetooth operations with no security compromise.

🌐 Internet-Facing: LOW - Requires local Bluetooth proximity and specific Bluetooth traffic patterns.
🏢 Internal Only: MEDIUM - Internal systems with Bluetooth enabled could experience service disruption if exploited.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires ability to send specific Bluetooth LE advertising packets and timing to trigger the deadlock condition.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commit 168e28305b871d8ec604a8f51f35467b8d7ba05b and c541d7b5e17987ed330798b07d4ad508859c1c93

Vendor Advisory: https://git.kernel.org/stable/c/168e28305b871d8ec604a8f51f35467b8d7ba05b

Restart Required: Yes

Instructions:

1. Update to a kernel version containing the fix commit. 2. Check your distribution's security advisories for backported patches. 3. Reboot the system after kernel update.

🔧 Temporary Workarounds

Disable Bluetooth functionality

linux

Completely disable Bluetooth to prevent the vulnerability from being triggered

systemctl stop bluetooth
systemctl disable bluetooth
rfkill block bluetooth

Disable Bluetooth LE ISO features

linux

Disable specific Bluetooth LE isochronous features if supported by your Bluetooth stack

🧯 If You Can't Patch

  • Implement network segmentation to isolate Bluetooth traffic
  • Monitor system logs for deadlock warnings and implement alerting

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if it contains the vulnerable code. Look for kernel logs containing 'circular locking dependency' warnings related to Bluetooth ISO.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes the fix commits or check that circular locking warnings no longer appear in dmesg during Bluetooth operations.

📡 Detection & Monitoring

Log Indicators:

  • Kernel logs showing 'circular locking dependency detected' with Bluetooth ISO references
  • System becoming unresponsive during Bluetooth operations

Network Indicators:

  • Unusual Bluetooth LE advertising patterns
  • Bluetooth connection failures

SIEM Query:

source="kernel" AND "circular locking" AND "bluetooth"

🔗 References

📤 Share & Export