CVE-2024-50078
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-50078 affects the Linux kernel's Bluetooth subsystem. The vulnerability was discovered when the isoexit() function was not being called during module unload after isoinit() had been called. This issue affects Linux kernel versions from 6.0 up to (excluding) 6.1.114, 6.2 up to (excluding) 6.6.58, and 6.7 up to (excluding) 6.11.5 (NVD).

Technical details

The vulnerability occurs in the Bluetooth module's cleanup process. When isoinit() has been called, the corresponding isoexit() must be called on module unload. Without proper cleanup, the struct proto that isoinit() registered with protoregister() becomes invalid, which can lead to unpredictable behavior. The issue has a CVSS v3.1 Base Score of 5.5 (MEDIUM) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).

Impact

When the vulnerability is triggered, particularly with CONFIGLISTHARDENED and CONFIGBUGONDATACORRUPTION enabled, attempting to load the module again typically results in a list_add corruption bug, causing a kernel crash. This can lead to a denial of service condition (Kernel Patch).

Mitigation and workarounds

The vulnerability has been patched in the Linux kernel by adding a call to iso_exit() in the module cleanup routine. The fix has been backported to affected stable kernel versions. Users should update to Linux kernel versions 6.1.114, 6.6.58, or 6.11.5 or later, depending on their kernel series (NVD).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management