There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel pointers remotely.
We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url
References
Link | Resource |
---|---|
https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e | Patch Third Party Advisory |
https://kernel.dance/#b1a2cd50c0357f243b7435a732b4e62ba3157a2e | Patch Third Party Advisory |
https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e | Patch Third Party Advisory |
https://kernel.dance/#b1a2cd50c0357f243b7435a732b4e62ba3157a2e | Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-11-23 15:15
Updated : 2024-11-21 07:25
NVD link : CVE-2022-42895
Mitre link : CVE-2022-42895
CVE.ORG link : CVE-2022-42895
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-824
Access of Uninitialized Pointer