There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2capcore.c's l2capconnect and l2capleconnect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim.
We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-42896.json"
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.9.335"
}
]
},
{
"events": [
{
"introduced": "4.10"
},
{
"fixed": "4.14.301"
}
]
},
{
"events": [
{
"introduced": "4.15"
},
{
"fixed": "4.19.268"
}
]
},
{
"events": [
{
"introduced": "4.20"
},
{
"fixed": "5.4.226"
}
]
},
{
"events": [
{
"introduced": "5.5"
},
{
"fixed": "5.10.154"
}
]
},
{
"events": [
{
"introduced": "5.11"
},
{
"fixed": "5.15.78"
}
]
},
{
"events": [
{
"introduced": "5.16"
},
{
"fixed": "6.0.8"
}
]
}
]