Skip to main content

CVE-2022-49555: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49555cvecve-2022-49555
Published: Wed Feb 26 2025 (02/26/2025, 02:14:03 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_qca: Use del_timer_sync() before freeing While looking at a crash report on a timer list being corrupted, which usually happens when a timer is freed while still active. This is commonly triggered by code calling del_timer() instead of del_timer_sync() just before freeing. One possible culprit is the hci_qca driver, which does exactly that. Eric mentioned that wake_retrans_timer could be rearmed via the work queue, so also move the destruction of the work queue before del_timer_sync().

AI-Powered Analysis

AILast updated: 06/29/2025, 22:25:28 UTC

Technical Analysis

CVE-2022-49555 is a vulnerability identified in the Linux kernel's Bluetooth subsystem, specifically within the hci_qca driver. The issue arises from improper handling of kernel timers. The vulnerability is due to the use of del_timer() instead of del_timer_sync() before freeing a timer. When a timer is freed while still active, it can lead to corruption of the timer list, causing kernel crashes or undefined behavior. The hci_qca driver, which manages Qualcomm Atheros Bluetooth hardware, was found to call del_timer() incorrectly. Additionally, the wake_retrans_timer, which can be rearmed via the work queue, was not properly synchronized with timer deletion, leading to potential race conditions. The fix involves using del_timer_sync() to ensure the timer is fully deactivated before freeing and reordering the destruction of the work queue to occur before the timer deletion. This vulnerability is a use-after-free or race condition type issue in kernel timer management, which can cause system instability or crashes. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The affected versions appear to be specific commits or builds of the Linux kernel, indicating this is a recent or very specific patch-level vulnerability.

Potential Impact

For European organizations, the impact of this vulnerability primarily concerns systems running Linux kernels with the affected hci_qca Bluetooth driver. This includes servers, desktops, and embedded devices that use Qualcomm Atheros Bluetooth hardware. Exploitation could lead to kernel crashes or denial of service, impacting system availability. While no direct remote code execution or privilege escalation is indicated, system instability in critical infrastructure, industrial control systems, or enterprise environments could disrupt operations. Organizations relying on Bluetooth connectivity for device management or IoT integration may face increased risk of service interruptions. The lack of known exploits reduces immediate risk, but the vulnerability's presence in the kernel means that any Linux-based system using the affected driver is potentially vulnerable until patched. This could affect sectors such as telecommunications, manufacturing, healthcare, and public services that use Linux extensively.

Mitigation Recommendations

European organizations should promptly apply the Linux kernel patches that address this vulnerability, ensuring the hci_qca driver uses del_timer_sync() correctly and that work queue destruction is properly ordered. Kernel updates from trusted Linux distributions should be monitored and deployed as soon as they become available. For environments where immediate patching is not feasible, disabling Bluetooth or specifically the Qualcomm Atheros Bluetooth driver could mitigate risk temporarily. System administrators should audit their Linux systems to identify the presence of the hci_qca driver and verify kernel versions. Additionally, monitoring system logs for kernel timer-related errors or crashes can help detect attempts to trigger this vulnerability. Implementing strict access controls and limiting user privileges can reduce the risk of exploitation attempts. Finally, organizations should maintain robust backup and recovery procedures to minimize downtime in case of system crashes caused by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:08:31.590Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe4424

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 6/29/2025, 10:25:28 PM

Last updated: 8/11/2025, 2:08:11 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats