8.8
CVSSv3

CVE-2022-42896

Published: 23/11/2022 Updated: 01/03/2023
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8

Vulnerability Summary

It exists that an integer overflow vulnerability existed in the Bluetooth subsystem in the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2022-45934) ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
DescriptionThe MITRE CVE dictionary describes this issue as: There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_corec's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth A remote attacker could execute code leaking kernel ...
use-after-free in net/bluetooth/l2cap_corec's l2cap_connect and l2cap_le_connect_req may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
A vulnerability was found in Linux Kernel It has been declared as problematic Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler The manipulation leads to memory leak The attack can be launched remotely It is recommended to apply a patch to fix this issue The identifier VDB-211021 was assigned to t ...

Github Repositories

CVE-2022-42896 There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_corec's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim We recomme

Linux Kernel Exploitation A collection of links related to Linux kernel security and exploitation Updated bimonthly Pull requests are welcome as well Follow @andreyknvl on Twitter to be notified of updates Subscribe to @linkersec on Telegram, Twitter, or Reddit for highlights Trainings See xairyio/trainings/ Contents Books Techniques Exploitation Protection Bypasses