In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: Fix crash when replugging CSR fake controllers
It seems fake CSR 5.0 clones can cause the suspend notifier to be registered twice causing the following kernel panic:
[ 71.986122] Call Trace: [ 71.986124] <TASK> [ 71.986125] blockingnotifierchainregister+0x33/0x60 [ 71.986130] hciregisterdev+0x316/0x3d0 [bluetooth 99b5497ea3d09708fa1366c1dc03288bf3cca8da] [ 71.986154] btusbprobe+0x979/0xd85 [btusb e1e0605a4f4c01984a4b9c8ac58c3666ae287477] [ 71.986159] ? _pmruntimesetstatus+0x1a9/0x300 [ 71.986162] ? ktimegetmonofastns+0x3e/0x90 [ 71.986167] usbprobeinterface+0xe3/0x2b0 [ 71.986171] reallyprobe+0xdb/0x380 [ 71.986174] ? pmruntimebarrier+0x54/0x90 [ 71.986177] _driverprobedevice+0x78/0x170 [ 71.986180] driverprobedevice+0x1f/0x90 [ 71.986183] _deviceattachdriver+0x89/0x110 [ 71.986186] ? driverallowsasyncprobing+0x70/0x70 [ 71.986189] busforeachdrv+0x8c/0xe0 [ 71.986192] _deviceattach+0xb2/0x1e0 [ 71.986195] busprobedevice+0x92/0xb0 [ 71.986198] deviceadd+0x422/0x9a0 [ 71.986201] ? sysfsmergegroup+0xd4/0x110 [ 71.986205] usbsetconfiguration+0x57a/0x820 [ 71.986208] usbgenericdriverprobe+0x4f/0x70 [ 71.986211] usbprobedevice+0x3a/0x110 [ 71.986213] reallyprobe+0xdb/0x380 [ 71.986216] ? pmruntimebarrier+0x54/0x90 [ 71.986219] _driverprobedevice+0x78/0x170 [ 71.986221] driverprobedevice+0x1f/0x90 [ 71.986224] _deviceattachdriver+0x89/0x110 [ 71.986227] ? driverallowsasyncprobing+0x70/0x70 [ 71.986230] busforeachdrv+0x8c/0xe0 [ 71.986232] _deviceattach+0xb2/0x1e0 [ 71.986235] busprobedevice+0x92/0xb0 [ 71.986237] deviceadd+0x422/0x9a0 [ 71.986239] ? _devinfo+0x7d/0x98 [ 71.986242] ? blake2supdate+0x4c/0xc0 [ 71.986246] usbnewdevice.cold+0x148/0x36d [ 71.986250] hubevent+0xa8a/0x1910 [ 71.986255] processonework+0x1c4/0x380 [ 71.986259] workerthread+0x51/0x390 [ 71.986262] ? rescuerthread+0x3b0/0x3b0 [ 71.986264] kthread+0xdb/0x110 [ 71.986266] ? kthreadcompleteandexit+0x20/0x20 [ 71.986268] retfrom_fork+0x1f/0x30 [ 71.986273] </TASK> [ 71.986274] ---[ end trace 0000000000000000 ]--- [ 71.986284] btusb: probe of 2-1.6:1.0 failed with error -17
{ "vanir_signatures": [ { "digest": { "length": 186.0, "function_hash": "244843326638984629349160590677701239920" }, "target": { "function": "hci_unregister_suspend_notifier", "file": "net/bluetooth/hci_core.c" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dc8fa6570deadb70c3fb74d7cd8ce38849feaed0", "deprecated": false, "signature_version": "v1", "id": "CVE-2022-48982-2034d34a" }, { "digest": { "length": 257.0, "function_hash": "67757454436288988416326564877907287939" }, "target": { "function": "hci_register_suspend_notifier", "file": "net/bluetooth/hci_core.c" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dc8fa6570deadb70c3fb74d7cd8ce38849feaed0", "deprecated": false, "signature_version": "v1", "id": "CVE-2022-48982-9fa7497f" }, { "digest": { "line_hashes": [ "259369361378095300460975664182006653379", "137631259276783842100393295402385487382", "10585528368485041305317711435726910190", "327063581649730136998985121167110509670", "27971544739595913215230996468489284896", "232343767286407853044179501487167703386", "23293724515375960670781766943482972482", "121693895629193521507982002513989133587", "294975344646879374541757157789871745607" ], "threshold": 0.9 }, "target": { "file": "net/bluetooth/hci_core.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dc8fa6570deadb70c3fb74d7cd8ce38849feaed0", "deprecated": false, "signature_version": "v1", "id": "CVE-2022-48982-a80ef290" }, { "digest": { "length": 186.0, "function_hash": "244843326638984629349160590677701239920" }, "target": { "function": "hci_unregister_suspend_notifier", "file": "net/bluetooth/hci_core.c" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b5ca338751ad4783ec8d37b5d99c3e37b7813e59", "deprecated": false, "signature_version": "v1", "id": "CVE-2022-48982-dd4eb40e" }, { "digest": { "line_hashes": [ "259369361378095300460975664182006653379", "137631259276783842100393295402385487382", "10585528368485041305317711435726910190", "327063581649730136998985121167110509670", "27971544739595913215230996468489284896", "232343767286407853044179501487167703386", "23293724515375960670781766943482972482", "121693895629193521507982002513989133587", "294975344646879374541757157789871745607" ], "threshold": 0.9 }, "target": { "file": "net/bluetooth/hci_core.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b5ca338751ad4783ec8d37b5d99c3e37b7813e59", "deprecated": false, "signature_version": "v1", "id": "CVE-2022-48982-e547b15f" }, { "digest": { "length": 257.0, "function_hash": "67757454436288988416326564877907287939" }, "target": { "function": "hci_register_suspend_notifier", "file": "net/bluetooth/hci_core.c" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b5ca338751ad4783ec8d37b5d99c3e37b7813e59", "deprecated": false, "signature_version": "v1", "id": "CVE-2022-48982-f9099a7c" } ] }