Use-After-Free Vulnerability in Linux Kernel Bluetooth Stack
CVE-2022-49909
Summary
A use-after-free vulnerability exists in the Bluetooth L2CAP implementation of the Linux kernel. This vulnerability occurs when the system fails to adequately manage the reference counting of channels during error conditions. Specifically, when a channel is created and subsequently freed without proper synchronization, it could lead to a potential exploit vector. This flaw may allow an attacker to cause system instability, execute arbitrary code, or create denial of service conditions, making it crucial to apply timely patches to mitigate associated risks.
Affected Version(s)
Linux d255c861e268ba342e855244639a15f12d7a0bf2
Linux 5bb395334392891dffae5a0e8f37dbe1d70496c9 < 17c6164854f8bb80bf76f32b2c2f199c16b53703
Linux bbd1fdb0e1adf827997a93bf108f20ede038e56e < 7f7bfdd9a9af3b12c33d9da9a012e7f4d5c91f4b
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved