CVE-2022-49139
📋 TL;DR
A NULL pointer dereference vulnerability in the Linux kernel's Bluetooth subsystem allows local attackers to cause a kernel panic (denial of service) by sending specially crafted Bluetooth packets. This affects systems with Bluetooth enabled and requires local access or ability to send Bluetooth packets to the target system.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, potentially requiring physical or remote console access to reboot.
Likely Case
Local denial of service through kernel panic, requiring system reboot to restore functionality.
If Mitigated
No impact if Bluetooth is disabled or proper access controls prevent local attackers from sending Bluetooth packets.
🎯 Exploit Status
Requires ability to send Bluetooth packets to target system. Local access or proximity needed for Bluetooth communication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Multiple stable kernel versions with fixes: 0f9db1209f59844839175b5b907d3778cafde93d and others
Vendor Advisory: https://git.kernel.org/stable/c/0f9db1209f59844839175b5b907d3778cafde93d
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution's repositories. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable Bluetooth
linuxCompletely disable Bluetooth subsystem to prevent exploitation
sudo systemctl stop bluetooth
sudo systemctl disable bluetooth
sudo rfkill block bluetooth
Restrict Bluetooth access
linuxUse MAC address filtering or disable Bluetooth discovery to limit attack surface
sudo hciconfig hci0 noscan
sudo btmgmt power off
🧯 If You Can't Patch
- Disable Bluetooth completely on affected systems
- Implement strict access controls to prevent unauthorized local users from accessing Bluetooth interfaces
🔍 How to Verify
Check if Vulnerable:
Check kernel version and compare with distribution's security advisories. Vulnerable if running unpatched kernel with Bluetooth enabled.
Check Version:
uname -r
Verify Fix Applied:
Check kernel version after update matches patched version. Verify Bluetooth functionality still works without crashes.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages in /var/log/kern.log or dmesg
- Bluetooth subsystem crashes
- System reboots without clear cause
Network Indicators:
- Unusual Bluetooth packet patterns targeting hci_sync_conn_complete_evt
SIEM Query:
source="kernel" AND ("panic" OR "Oops" OR "NULL pointer dereference") AND "bluetooth"
🔗 References
- https://git.kernel.org/stable/c/0f9db1209f59844839175b5b907d3778cafde93d
- https://git.kernel.org/stable/c/1c1291a84e94f6501644634c97544bb8291e9a1a
- https://git.kernel.org/stable/c/3afee2118132e93e5f6fa636dfde86201a860ab3
- https://git.kernel.org/stable/c/c1aa0dd52db4ce888be0bd820c3fa918d350ca0b
- https://git.kernel.org/stable/c/f61c23e73dc653b957781066abfa8105c3fa3f5b