We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-58238

Bluetooth: btnxpuart: Resolve TX timeout error in power save stress test



Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btnxpuart: Resolve TX timeout error in power save stress test This fixes the tx timeout issue seen while running a stress test on btnxpuart for couple of hours, such that the interval between two HCI commands coincide with the power save timeout value of 2 seconds. Test procedure using bash script: <load btnxpuart.ko> hciconfig hci0 up //Enable Power Save feature hcitool -i hci0 cmd 3f 23 02 00 00 while (true) do hciconfig hci0 leadv sleep 2 hciconfig hci0 noleadv sleep 2 done Error log, after adding few more debug prints: Bluetooth: btnxpuart_queue_skb(): 01 0A 20 01 00 Bluetooth: hci0: Set UART break: on, status=0 Bluetooth: hci0: btnxpuart_tx_wakeup() tx_work scheduled Bluetooth: hci0: btnxpuart_tx_work() dequeue: 01 0A 20 01 00 Can't set advertise mode on hci0: Connection timed out (110) Bluetooth: hci0: command 0x200a tx timeout When the power save mechanism turns on UART break, and btnxpuart_tx_work() is scheduled simultaneously, psdata->ps_state is read as PS_STATE_AWAKE, which prevents the psdata->work from being scheduled, which is responsible to turn OFF UART break. This issue is fixed by adding a ps_lock mutex around UART break on/off as well as around ps_state read/write. btnxpuart_tx_wakeup() will now read updated ps_state value. If ps_state is PS_STATE_SLEEP, it will first schedule psdata->work, and then it will reschedule itself once UART break has been turned off and ps_state is PS_STATE_AWAKE. Tested above script for 50,000 iterations and TX timeout error was not observed anymore.

Reserved 2025-04-16 | Published 2025-08-09 | Updated 2025-08-09 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 9d5df94ce0e213d5b549633f528f96114c736190
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before e4db90e4eb8d5487098712ffb1048f3fa6d25e98
affected

Default status
affected

6.6.49
unaffected

6.9
unaffected

References

git.kernel.org/...c/9d5df94ce0e213d5b549633f528f96114c736190

git.kernel.org/...c/e4db90e4eb8d5487098712ffb1048f3fa6d25e98

cve.org (CVE-2024-58238)

nvd.nist.gov (CVE-2024-58238)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-58238

Support options

Helpdesk Chat, Email, Knowledgebase