There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2capcore.c's l2capconnect and l2capleconnect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim.
We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-42896.json"
[
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"length": 2930.0,
"function_hash": "92598119370525389913394621797113189299"
},
"signature_type": "Function",
"id": "CVE-2022-42896-49f306f0",
"source": "https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4",
"target": {
"function": "l2cap_ecred_conn_req",
"file": "net/bluetooth/l2cap_core.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"line_hashes": [
"149115855685134172817503797203429609886",
"328026439951515161331868902119530906676",
"339459158938606917029186399070235478249",
"117768777821488669844306782163269427034",
"335729741447054550549105578739208317030",
"234276987465743057892282189172183336819"
],
"threshold": 0.9
},
"signature_type": "Line",
"id": "CVE-2022-42896-55ab2fdc",
"source": "https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4",
"target": {
"file": "net/bluetooth/l2cap_core.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"length": 2416.0,
"function_hash": "152622523098857226957282857942601792318"
},
"signature_type": "Function",
"id": "CVE-2022-42896-84418884",
"source": "https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4",
"target": {
"function": "l2cap_le_connect_req",
"file": "net/bluetooth/l2cap_core.c"
}
}
]