CVE-2022-42896

Summary

CVECVE-2022-42896
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2022-11-23 15:15:00 UTC
Updated2023-11-07 03:53:00 UTC
DescriptionThere are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url

Risk And Classification

Problem Types: CWE-416

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Linux Linux Kernel All All All All
Operating System Linux Linux Kernel - All All All

References

ReferenceSourceLinkTags
???????? MISC kernel.dance
Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM · torvalds/linux@711f8c3 · GitHub MISC github.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 160381 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel (ELSA-2023-12017)
  • 160382 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel-container (ELSA-2023-12018)
  • 160447 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel (ELSA-2023-12109)
  • 160457 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel-container (ELSA-2023-12121)
  • 160458 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel (ELSA-2023-12117)
  • 160461 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel-container (ELSA-2023-12118)
  • 160462 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel (ELSA-2023-12119)
  • 160583 Oracle Enterprise Linux Security Update for kernel (ELSA-2023-2458)
  • 160859 Oracle Enterprise Linux Security Update for kernel (ELSA-2023-4517)
  • 161426 Oracle Enterprise Linux Security Update for kernel (ELSA-2024-1249)
  • 181383 Debian Security Update for linux (CVE-2022-42896)
  • 181440 Debian Security Update for linux-5.10 (DLA 3244-1)
  • 181565 Debian Security Update for linux (DLA 3245-1)
  • 199076 Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-5780-1)
  • 199080 Ubuntu Security Notification for Linux kernel (OEM) Vulnerability (USN-5783-1)
  • 199103 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5803-1)
  • 199105 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5804-1)
  • 199106 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5804-2)
  • 199110 Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-5809-1)
  • 199111 Ubuntu Security Notification for Linux kernel (IBM) Vulnerabilities (USN-5808-1)
  • 199118 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5814-1)
  • 199121 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5813-1)
  • 199132 Ubuntu Security Notification for Linux kernel (Raspberry Pi) Vulnerabilities (USN-5829-1)
  • 199136 Ubuntu Security Notification for Linux kernel (Azure CVM) Vulnerabilities (USN-5831-1)
  • 199137 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5830-1)
  • 199138 Ubuntu Security Notification for Linux kernel (Raspberry Pi) Vulnerabilities (USN-5832-1)
  • 199160 Ubuntu Security Notification for Linux kernel (GKE) Vulnerabilities (USN-5860-1)
  • 199165 Ubuntu Security Notification for Linux kernel (Dell300x) Vulnerabilities (USN-5861-1)
  • 199179 Ubuntu Security Notification for Linux kernel (GKE) Vulnerabilities (USN-5877-1)
  • 199180 Ubuntu Security Notification for Linux kernel (GKE) Vulnerabilities (USN-5875-1)
  • 199183 Ubuntu Security Notification for Linux kernel (HWE) Vulnerabilities (USN-5879-1)
  • 199207 Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-5914-1)
  • 199213 Ubuntu Security Notification for Linux kernel (BlueField) Vulnerabilities (USN-5918-1)
  • 199490 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5802-1)
  • 199519 Ubuntu Security Notification for Linux kernel (Azure) Vulnerabilities (USN-5863-1)
  • 199547 Ubuntu Security Notification for Linux kernel (AWS) Vulnerabilities (USN-5794-1)
  • 241417 Red Hat Update for kernel security (RHSA-2023:2458)
  • 241468 Red Hat Update for kernel-rt (RHSA-2023:2148)
  • 241592 Red Hat Update for kernel-rt (RHSA-2023:3462)
  • 241615 Red Hat Update for kpatch-patch (RHSA-2023:3517)
  • 241658 Red Hat Update for kernel (RHSA-2023:3461)
  • 241823 Red Hat Update for kernel (RHSA-2023:4137)
  • 241830 Red Hat Update for kernel-rt (RHSA-2023:4138)
  • 241858 Red Hat Update for kpatch-patch (RHSA-2023:4230)
  • 241927 Red Hat Update for kernel-rt (RHSA-2023:4541)
  • 241934 Red Hat Update for kpatch-patch (RHSA-2023:4531)
  • 241936 Red Hat Update for kernel (RHSA-2023:4517)
  • 242140 Red Hat Update for kpatch-patch (RHSA-2023:5580)
  • 242152 Red Hat Update for kernel (RHSA-2023:5589)
  • 242155 Red Hat Update for kernel-rt (RHSA-2023:5588)
  • 243051 Red Hat Update for kernel (RHSA-2024:1249)
  • 243068 Red Hat Update for kpatch-patch (RHSA-2024:1323)
  • 243071 Red Hat Update for kernel-rt (RHSA-2024:1332)
  • 257311 CentOS Security Update for kernel (CESA-2024:1249)
  • 354272 Amazon Linux Security Advisory for kernel : ALAS2-2022-1903
  • 377891 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-2023:0002)
  • 378468 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-20230042)
  • 378473 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX2-SA-2023:0021)
  • 378512 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-2023:0042)
  • 672532 EulerOS Security Update for kernel (EulerOS-SA-2023-1126)
  • 753014 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:4505-1)
  • 753020 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:4585-1)
  • 753034 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:4504-1)
  • 753038 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:4573-1)
  • 753039 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:4574-1)
  • 753045 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:4503-1)
  • 753047 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:4566-1)
  • 753051 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:4589-1)
  • 753060 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:4615-1)
  • 753061 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:4616-1)
  • 753062 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:4613-1)
  • 753063 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:4617-1)
  • 941023 AlmaLinux Security Update for kernel (ALSA-2023:2458)
  • 941061 AlmaLinux Security Update for kernel-rt (ALSA-2023:2148)
  • 941227 AlmaLinux Security Update for kernel (ALSA-2023:4517)
  • 941228 AlmaLinux Security Update for kernel-rt (ALSA-2023:4541)
  • 961032 Rocky Linux Security Update for kernel (RLSA-2023:4517)
  • 961046 Rocky Linux Security Update for kernel-rt (RLSA-2023:4541)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report