Skip to main content

CVE-2022-48878: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-48878cvecve-2022-48878
Published: Wed Aug 21 2024 (08/21/2024, 06:10:09 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_qca: Fix driver shutdown on closed serdev The driver shutdown callback (which sends EDL_SOC_RESET to the device over serdev) should not be invoked when HCI device is not open (e.g. if hci_dev_open_sync() failed), because the serdev and its TTY are not open either. Also skip this step if device is powered off (qca_power_shutdown()). The shutdown callback causes use-after-free during system reboot with Qualcomm Atheros Bluetooth: Unable to handle kernel paging request at virtual address 0072662f67726fd7 ... CPU: 6 PID: 1 Comm: systemd-shutdow Tainted: G W 6.1.0-rt5-00325-g8a5f56bcfcca #8 Hardware name: Qualcomm Technologies, Inc. Robotics RB5 (DT) Call trace: tty_driver_flush_buffer+0x4/0x30 serdev_device_write_flush+0x24/0x34 qca_serdev_shutdown+0x80/0x130 [hci_uart] device_shutdown+0x15c/0x260 kernel_restart+0x48/0xac KASAN report: BUG: KASAN: use-after-free in tty_driver_flush_buffer+0x1c/0x50 Read of size 8 at addr ffff16270c2e0018 by task systemd-shutdow/1 CPU: 7 PID: 1 Comm: systemd-shutdow Not tainted 6.1.0-next-20221220-00014-gb85aaf97fb01-dirty #28 Hardware name: Qualcomm Technologies, Inc. Robotics RB5 (DT) Call trace: dump_backtrace.part.0+0xdc/0xf0 show_stack+0x18/0x30 dump_stack_lvl+0x68/0x84 print_report+0x188/0x488 kasan_report+0xa4/0xf0 __asan_load8+0x80/0xac tty_driver_flush_buffer+0x1c/0x50 ttyport_write_flush+0x34/0x44 serdev_device_write_flush+0x48/0x60 qca_serdev_shutdown+0x124/0x274 device_shutdown+0x1e8/0x350 kernel_restart+0x48/0xb0 __do_sys_reboot+0x244/0x2d0 __arm64_sys_reboot+0x54/0x70 invoke_syscall+0x60/0x190 el0_svc_common.constprop.0+0x7c/0x160 do_el0_svc+0x44/0xf0 el0_svc+0x2c/0x6c el0t_64_sync_handler+0xbc/0x140 el0t_64_sync+0x190/0x194

AI-Powered Analysis

AILast updated: 06/30/2025, 23:10:00 UTC

Technical Analysis

CVE-2022-48878 is a vulnerability identified in the Linux kernel specifically affecting the Qualcomm Atheros Bluetooth driver (hci_qca) that interfaces over the serial device (serdev) subsystem. The flaw arises during the driver shutdown process when the HCI (Host Controller Interface) device is not properly open, such as when the hci_dev_open_sync() call fails, or if the device is powered off. Under these conditions, the driver shutdown callback erroneously attempts to send an EDL_SOC_RESET command over serdev, even though the serdev and its associated TTY interface are not open. This improper handling leads to a use-after-free condition during system reboot sequences involving Qualcomm Atheros Bluetooth hardware. The kernel address sanitizer (KASAN) reports confirm that the use-after-free occurs in the tty_driver_flush_buffer function, triggered by the qca_serdev_shutdown callback during device shutdown. This results in a kernel paging fault and potential system instability or crash during reboot. The vulnerability is rooted in the Linux kernel's Bluetooth subsystem and affects versions prior to the patch that prevents the shutdown callback from executing when the device is not open or powered off. The issue is particularly relevant for embedded or robotics platforms using Qualcomm Technologies hardware, as evidenced by the hardware name in the report (Qualcomm Technologies, Inc. Robotics RB5). No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. However, the vulnerability can cause kernel crashes and denial of service during reboot, impacting system reliability and availability.

Potential Impact

For European organizations, this vulnerability primarily threatens systems running Linux kernels with Qualcomm Atheros Bluetooth hardware, especially in embedded, robotics, IoT, or industrial control environments. The use-after-free bug can cause kernel panics or system crashes during reboot, leading to denial of service conditions. This can disrupt critical operations, particularly in sectors relying on robotics automation, manufacturing, or telecommunications infrastructure that utilize Qualcomm Bluetooth components. While the vulnerability does not directly expose data confidentiality or integrity risks, the resulting instability can cause operational downtime, impacting business continuity and potentially safety-critical systems. Organizations with Linux-based devices in their operational technology (OT) environments or those deploying Qualcomm Bluetooth-enabled hardware in endpoint devices should be aware of this risk. The lack of known exploits reduces immediate threat but does not eliminate the risk of future targeted attacks or accidental system failures triggered by this flaw.

Mitigation Recommendations

1. Apply the latest Linux kernel patches that address CVE-2022-48878 as soon as they become available from trusted Linux distributions or kernel maintainers. 2. For embedded or specialized systems, coordinate with hardware and software vendors to obtain updated firmware and kernel versions incorporating the fix. 3. Implement rigorous testing of system reboot sequences in controlled environments to detect instability related to Bluetooth driver shutdown. 4. Where possible, disable or remove Qualcomm Atheros Bluetooth devices if they are not essential to operations, reducing the attack surface. 5. Monitor system logs and kernel messages for signs of use-after-free or paging faults related to Bluetooth driver shutdown to enable early detection. 6. Incorporate kernel address sanitizer (KASAN) or similar runtime memory error detection tools during development and testing phases to catch similar issues proactively. 7. Maintain robust backup and recovery procedures to minimize downtime impact in case of system crashes caused by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-07-16T11:38:08.922Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982fc4522896dcbe6490

Added to database: 5/21/2025, 9:09:03 AM

Last enriched: 6/30/2025, 11:10:00 PM

Last updated: 8/15/2025, 3:36:15 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats