7.8
CWE
416 362
Advisory Published
Updated

CVE-2022-49474: Bluetooth: fix dangling sco_conn and use-after-free in sco_sock_timeout

First published: Wed Feb 26 2025(Updated: )

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: fix dangling sco_conn and use-after-free in sco_sock_timeout Connecting the same socket twice consecutively in sco_sock_connect() could lead to a race condition where two sco_conn objects are created but only one is associated with the socket. If the socket is closed before the SCO connection is established, the timer associated with the dangling sco_conn object won't be canceled. As the sock object is being freed, the use-after-free problem happens when the timer callback function sco_sock_timeout() accesses the socket. Here's the call trace: dump_stack+0x107/0x163 ? refcount_inc+0x1c/ print_address_description.constprop.0+0x1c/0x47e ? refcount_inc+0x1c/0x7b kasan_report+0x13a/0x173 ? refcount_inc+0x1c/0x7b check_memory_region+0x132/0x139 refcount_inc+0x1c/0x7b sco_sock_timeout+0xb2/0x1ba process_one_work+0x739/0xbd1 ? cancel_delayed_work+0x13f/0x13f ? __raw_spin_lock_init+0xf0/0xf0 ? to_kthread+0x59/0x85 worker_thread+0x593/0x70e kthread+0x346/0x35a ? drain_workqueue+0x31a/0x31a ? kthread_bind+0x4b/0x4b ret_from_fork+0x1f/0x30

Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

Affected SoftwareAffected VersionHow to fix
Linux Kernel
Linux Kernel>=4.4.284<4.5
Linux Kernel>=4.9.238<4.9.318
Linux Kernel>=4.14.247<4.14.283
Linux Kernel>=4.19.207<4.19.247
Linux Kernel>=5.4.146<5.4.198
Linux Kernel>=5.10.65<5.10.121
Linux Kernel>=5.13.17<5.14
Linux Kernel>=5.14.4<5.15.46
Linux Kernel>=5.16<5.17.14
Linux Kernel>=5.18<5.18.3

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2022-49474?

    CVE-2022-49474 is rated as a high severity vulnerability due to its potential to cause system instability and security breaches.

  • Which Linux kernel versions are affected by CVE-2022-49474?

    CVE-2022-49474 affects multiple Linux kernel versions from 4.4.284 to 5.18.3.

  • How do I fix CVE-2022-49474?

    To fix CVE-2022-49474, upgrade your Linux kernel to a version that is patched against this vulnerability.

  • What is the nature of the vulnerability CVE-2022-49474?

    CVE-2022-49474 is a use-after-free vulnerability in the Bluetooth subsystem that can lead to a race condition.

  • Is CVE-2022-49474 a remote code execution vulnerability?

    CVE-2022-49474 does not directly lead to remote code execution, but it can cause a system crash or instability.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203