CVE-2022-49555: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_qca: Use del_timer_sync() before freeing While looking at a crash report on a timer list being corrupted, which usually happens when a timer is freed while still active. This is commonly triggered by code calling del_timer() instead of del_timer_sync() just before freeing. One possible culprit is the hci_qca driver, which does exactly that. Eric mentioned that wake_retrans_timer could be rearmed via the work queue, so also move the destruction of the work queue before del_timer_sync().
AI Analysis
Technical Summary
CVE-2022-49555 is a vulnerability identified in the Linux kernel's Bluetooth subsystem, specifically within the hci_qca driver. The issue arises from improper handling of kernel timers. The vulnerability is due to the use of del_timer() instead of del_timer_sync() before freeing a timer. When a timer is freed while still active, it can lead to corruption of the timer list, causing kernel crashes or undefined behavior. The hci_qca driver, which manages Qualcomm Atheros Bluetooth hardware, was found to call del_timer() incorrectly. Additionally, the wake_retrans_timer, which can be rearmed via the work queue, was not properly synchronized with timer deletion, leading to potential race conditions. The fix involves using del_timer_sync() to ensure the timer is fully deactivated before freeing and reordering the destruction of the work queue to occur before the timer deletion. This vulnerability is a use-after-free or race condition type issue in kernel timer management, which can cause system instability or crashes. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The affected versions appear to be specific commits or builds of the Linux kernel, indicating this is a recent or very specific patch-level vulnerability.
Potential Impact
For European organizations, the impact of this vulnerability primarily concerns systems running Linux kernels with the affected hci_qca Bluetooth driver. This includes servers, desktops, and embedded devices that use Qualcomm Atheros Bluetooth hardware. Exploitation could lead to kernel crashes or denial of service, impacting system availability. While no direct remote code execution or privilege escalation is indicated, system instability in critical infrastructure, industrial control systems, or enterprise environments could disrupt operations. Organizations relying on Bluetooth connectivity for device management or IoT integration may face increased risk of service interruptions. The lack of known exploits reduces immediate risk, but the vulnerability's presence in the kernel means that any Linux-based system using the affected driver is potentially vulnerable until patched. This could affect sectors such as telecommunications, manufacturing, healthcare, and public services that use Linux extensively.
Mitigation Recommendations
European organizations should promptly apply the Linux kernel patches that address this vulnerability, ensuring the hci_qca driver uses del_timer_sync() correctly and that work queue destruction is properly ordered. Kernel updates from trusted Linux distributions should be monitored and deployed as soon as they become available. For environments where immediate patching is not feasible, disabling Bluetooth or specifically the Qualcomm Atheros Bluetooth driver could mitigate risk temporarily. System administrators should audit their Linux systems to identify the presence of the hci_qca driver and verify kernel versions. Additionally, monitoring system logs for kernel timer-related errors or crashes can help detect attempts to trigger this vulnerability. Implementing strict access controls and limiting user privileges can reduce the risk of exploitation attempts. Finally, organizations should maintain robust backup and recovery procedures to minimize downtime in case of system crashes caused by this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-49555: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_qca: Use del_timer_sync() before freeing While looking at a crash report on a timer list being corrupted, which usually happens when a timer is freed while still active. This is commonly triggered by code calling del_timer() instead of del_timer_sync() just before freeing. One possible culprit is the hci_qca driver, which does exactly that. Eric mentioned that wake_retrans_timer could be rearmed via the work queue, so also move the destruction of the work queue before del_timer_sync().
AI-Powered Analysis
Technical Analysis
CVE-2022-49555 is a vulnerability identified in the Linux kernel's Bluetooth subsystem, specifically within the hci_qca driver. The issue arises from improper handling of kernel timers. The vulnerability is due to the use of del_timer() instead of del_timer_sync() before freeing a timer. When a timer is freed while still active, it can lead to corruption of the timer list, causing kernel crashes or undefined behavior. The hci_qca driver, which manages Qualcomm Atheros Bluetooth hardware, was found to call del_timer() incorrectly. Additionally, the wake_retrans_timer, which can be rearmed via the work queue, was not properly synchronized with timer deletion, leading to potential race conditions. The fix involves using del_timer_sync() to ensure the timer is fully deactivated before freeing and reordering the destruction of the work queue to occur before the timer deletion. This vulnerability is a use-after-free or race condition type issue in kernel timer management, which can cause system instability or crashes. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The affected versions appear to be specific commits or builds of the Linux kernel, indicating this is a recent or very specific patch-level vulnerability.
Potential Impact
For European organizations, the impact of this vulnerability primarily concerns systems running Linux kernels with the affected hci_qca Bluetooth driver. This includes servers, desktops, and embedded devices that use Qualcomm Atheros Bluetooth hardware. Exploitation could lead to kernel crashes or denial of service, impacting system availability. While no direct remote code execution or privilege escalation is indicated, system instability in critical infrastructure, industrial control systems, or enterprise environments could disrupt operations. Organizations relying on Bluetooth connectivity for device management or IoT integration may face increased risk of service interruptions. The lack of known exploits reduces immediate risk, but the vulnerability's presence in the kernel means that any Linux-based system using the affected driver is potentially vulnerable until patched. This could affect sectors such as telecommunications, manufacturing, healthcare, and public services that use Linux extensively.
Mitigation Recommendations
European organizations should promptly apply the Linux kernel patches that address this vulnerability, ensuring the hci_qca driver uses del_timer_sync() correctly and that work queue destruction is properly ordered. Kernel updates from trusted Linux distributions should be monitored and deployed as soon as they become available. For environments where immediate patching is not feasible, disabling Bluetooth or specifically the Qualcomm Atheros Bluetooth driver could mitigate risk temporarily. System administrators should audit their Linux systems to identify the presence of the hci_qca driver and verify kernel versions. Additionally, monitoring system logs for kernel timer-related errors or crashes can help detect attempts to trigger this vulnerability. Implementing strict access controls and limiting user privileges can reduce the risk of exploitation attempts. Finally, organizations should maintain robust backup and recovery procedures to minimize downtime in case of system crashes caused by this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:08:31.590Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982bc4522896dcbe4424
Added to database: 5/21/2025, 9:08:59 AM
Last enriched: 6/29/2025, 10:25:28 PM
Last updated: 8/11/2025, 2:08:11 PM
Views: 14
Related Threats
CVE-2025-8955: SQL Injection in PHPGurukul Hospital Management System
MediumCVE-2025-8954: SQL Injection in PHPGurukul Hospital Management System
MediumCVE-2025-8953: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-54472: CWE-400 Uncontrolled Resource Consumption in Apache Software Foundation Apache bRPC
HighCVE-2025-48862: CWE-1104 Use of Unmaintained Third Party Components in Bosch Rexroth AG ctrlX OS - Setup
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.