CVE-2022-48982

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-48982
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48982.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-48982
Downstream
Related
Published
2024-10-21T20:05:59Z
Modified
2025-10-14T20:59:22.351180Z
Summary
Bluetooth: Fix crash when replugging CSR fake controllers
Details

In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix crash when replugging CSR fake controllers

It seems fake CSR 5.0 clones can cause the suspend notifier to be registered twice causing the following kernel panic:

[ 71.986122] Call Trace: [ 71.986124] <TASK> [ 71.986125] blockingnotifierchainregister+0x33/0x60 [ 71.986130] hciregisterdev+0x316/0x3d0 [bluetooth 99b5497ea3d09708fa1366c1dc03288bf3cca8da] [ 71.986154] btusbprobe+0x979/0xd85 [btusb e1e0605a4f4c01984a4b9c8ac58c3666ae287477] [ 71.986159] ? _pmruntimesetstatus+0x1a9/0x300 [ 71.986162] ? ktimegetmonofastns+0x3e/0x90 [ 71.986167] usbprobeinterface+0xe3/0x2b0 [ 71.986171] reallyprobe+0xdb/0x380 [ 71.986174] ? pmruntimebarrier+0x54/0x90 [ 71.986177] _driverprobedevice+0x78/0x170 [ 71.986180] driverprobedevice+0x1f/0x90 [ 71.986183] _deviceattachdriver+0x89/0x110 [ 71.986186] ? driverallowsasyncprobing+0x70/0x70 [ 71.986189] busforeachdrv+0x8c/0xe0 [ 71.986192] _deviceattach+0xb2/0x1e0 [ 71.986195] busprobedevice+0x92/0xb0 [ 71.986198] deviceadd+0x422/0x9a0 [ 71.986201] ? sysfsmergegroup+0xd4/0x110 [ 71.986205] usbsetconfiguration+0x57a/0x820 [ 71.986208] usbgenericdriverprobe+0x4f/0x70 [ 71.986211] usbprobedevice+0x3a/0x110 [ 71.986213] reallyprobe+0xdb/0x380 [ 71.986216] ? pmruntimebarrier+0x54/0x90 [ 71.986219] _driverprobedevice+0x78/0x170 [ 71.986221] driverprobedevice+0x1f/0x90 [ 71.986224] _deviceattachdriver+0x89/0x110 [ 71.986227] ? driverallowsasyncprobing+0x70/0x70 [ 71.986230] busforeachdrv+0x8c/0xe0 [ 71.986232] _deviceattach+0xb2/0x1e0 [ 71.986235] busprobedevice+0x92/0xb0 [ 71.986237] deviceadd+0x422/0x9a0 [ 71.986239] ? _devinfo+0x7d/0x98 [ 71.986242] ? blake2supdate+0x4c/0xc0 [ 71.986246] usbnewdevice.cold+0x148/0x36d [ 71.986250] hubevent+0xa8a/0x1910 [ 71.986255] processonework+0x1c4/0x380 [ 71.986259] workerthread+0x51/0x390 [ 71.986262] ? rescuerthread+0x3b0/0x3b0 [ 71.986264] kthread+0xdb/0x110 [ 71.986266] ? kthreadcompleteandexit+0x20/0x20 [ 71.986268] retfrom_fork+0x1f/0x30 [ 71.986273] </TASK> [ 71.986274] ---[ end trace 0000000000000000 ]--- [ 71.986284] btusb: probe of 2-1.6:1.0 failed with error -17

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
359ee4f834f5b4f8096f7edc0c20ef37d1fca861
Fixed
dc8fa6570deadb70c3fb74d7cd8ce38849feaed0
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
359ee4f834f5b4f8096f7edc0c20ef37d1fca861
Fixed
b5ca338751ad4783ec8d37b5d99c3e37b7813e59

Affected versions

v5.*

v5.19
v5.19-rc8

v6.*

v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.0.1
v6.0.10
v6.0.11
v6.0.12
v6.0.2
v6.0.3
v6.0.4
v6.0.5
v6.0.6
v6.0.7
v6.0.8
v6.0.9
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7

Database specific

{
    "vanir_signatures": [
        {
            "digest": {
                "length": 186.0,
                "function_hash": "244843326638984629349160590677701239920"
            },
            "target": {
                "function": "hci_unregister_suspend_notifier",
                "file": "net/bluetooth/hci_core.c"
            },
            "signature_type": "Function",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dc8fa6570deadb70c3fb74d7cd8ce38849feaed0",
            "deprecated": false,
            "signature_version": "v1",
            "id": "CVE-2022-48982-2034d34a"
        },
        {
            "digest": {
                "length": 257.0,
                "function_hash": "67757454436288988416326564877907287939"
            },
            "target": {
                "function": "hci_register_suspend_notifier",
                "file": "net/bluetooth/hci_core.c"
            },
            "signature_type": "Function",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dc8fa6570deadb70c3fb74d7cd8ce38849feaed0",
            "deprecated": false,
            "signature_version": "v1",
            "id": "CVE-2022-48982-9fa7497f"
        },
        {
            "digest": {
                "line_hashes": [
                    "259369361378095300460975664182006653379",
                    "137631259276783842100393295402385487382",
                    "10585528368485041305317711435726910190",
                    "327063581649730136998985121167110509670",
                    "27971544739595913215230996468489284896",
                    "232343767286407853044179501487167703386",
                    "23293724515375960670781766943482972482",
                    "121693895629193521507982002513989133587",
                    "294975344646879374541757157789871745607"
                ],
                "threshold": 0.9
            },
            "target": {
                "file": "net/bluetooth/hci_core.c"
            },
            "signature_type": "Line",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dc8fa6570deadb70c3fb74d7cd8ce38849feaed0",
            "deprecated": false,
            "signature_version": "v1",
            "id": "CVE-2022-48982-a80ef290"
        },
        {
            "digest": {
                "length": 186.0,
                "function_hash": "244843326638984629349160590677701239920"
            },
            "target": {
                "function": "hci_unregister_suspend_notifier",
                "file": "net/bluetooth/hci_core.c"
            },
            "signature_type": "Function",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b5ca338751ad4783ec8d37b5d99c3e37b7813e59",
            "deprecated": false,
            "signature_version": "v1",
            "id": "CVE-2022-48982-dd4eb40e"
        },
        {
            "digest": {
                "line_hashes": [
                    "259369361378095300460975664182006653379",
                    "137631259276783842100393295402385487382",
                    "10585528368485041305317711435726910190",
                    "327063581649730136998985121167110509670",
                    "27971544739595913215230996468489284896",
                    "232343767286407853044179501487167703386",
                    "23293724515375960670781766943482972482",
                    "121693895629193521507982002513989133587",
                    "294975344646879374541757157789871745607"
                ],
                "threshold": 0.9
            },
            "target": {
                "file": "net/bluetooth/hci_core.c"
            },
            "signature_type": "Line",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b5ca338751ad4783ec8d37b5d99c3e37b7813e59",
            "deprecated": false,
            "signature_version": "v1",
            "id": "CVE-2022-48982-e547b15f"
        },
        {
            "digest": {
                "length": 257.0,
                "function_hash": "67757454436288988416326564877907287939"
            },
            "target": {
                "function": "hci_register_suspend_notifier",
                "file": "net/bluetooth/hci_core.c"
            },
            "signature_type": "Function",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b5ca338751ad4783ec8d37b5d99c3e37b7813e59",
            "deprecated": false,
            "signature_version": "v1",
            "id": "CVE-2022-48982-f9099a7c"
        }
    ]
}

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.0.0
Fixed
6.0.13