Back to bug 2147364

Who When What Removed Added
Pedro Sampaio 2022-11-23 19:25:09 UTC Blocks 2147365
Mauro Matteo Cascella 2022-11-25 10:10:06 UTC Fixed In Version kernel 6.1-rc4
Mauro Matteo Cascella 2022-11-25 10:23:28 UTC Summary CVE-2022-42896 kernel: Use after free in l2cap_connect and l2cap_le_connect_req functions in net/bluetooth/l2cap_core.c CVE-2022-42896 kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c
Mauro Matteo Cascella 2022-11-25 10:29:31 UTC Blocks 2147365
Mauro Matteo Cascella 2022-11-25 10:30:03 UTC Blocks 2142956
Mauro Matteo Cascella 2022-11-25 10:50:00 UTC Severity high medium
Priority high medium
Mauro Matteo Cascella 2022-11-25 10:52:24 UTC Doc Text A use-after-free flaw was found in the Linux kernel's implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_connect and l2cap_le_connect_req functions. An attacker with physical access within the range of standard Bluetooth transmission could execute code leaking kernel memory via Bluetooth if within proximity of the victim.
Mauro Matteo Cascella 2022-11-25 11:14:25 UTC Depends On 2148401
Mauro Matteo Cascella 2022-11-25 11:18:15 UTC Depends On 2148405, 2148402, 2148403, 2148404
Red Hat Bugzilla 2022-12-31 23:36:47 UTC CC fhrbata
Alex 2023-02-27 14:52:01 UTC CC mcascell
Flags needinfo?(mcascell)
Mauro Matteo Cascella 2023-03-02 16:02:08 UTC Comment 0 updated
Mauro Matteo Cascella 2023-03-02 17:35:30 UTC CC allarkin
Flags needinfo?(mcascell) needinfo?(allarkin)
Alex 2023-03-05 08:43:15 UTC Flags needinfo?(allarkin) needinfo?(mcascell)
Mauro Matteo Cascella 2023-03-06 10:00:41 UTC Flags needinfo?(mcascell)
Mauro Matteo Cascella 2023-03-08 22:00:37 UTC CC jpoimboe, kpatch-maint, rhandlin, ycote
Mauro Matteo Cascella 2023-03-08 22:01:02 UTC Severity medium high
Priority medium high
Mauro Matteo Cascella 2023-03-08 22:06:09 UTC Depends On 2176650, 2176640, 2176647, 2176656, 2176653, 2176649, 2176641, 2176657, 2176651, 2176643, 2176655, 2176646, 2176644, 2176648, 2176654, 2176645
Mauro Matteo Cascella 2023-03-08 22:10:08 UTC Depends On 2176662, 2176661, 2176659, 2176669, 2176665, 2176663, 2176666, 2176660, 2176664, 2176668, 2176667
Mauro Matteo Cascella 2023-03-08 22:12:09 UTC Depends On 2176678, 2176676, 2176677, 2176671, 2176675, 2176673, 2176672, 2176674, 2176679
Red Hat Bugzilla 2023-04-01 08:42:42 UTC CC dhoward
errata-xmlrpc 2023-05-09 07:12:26 UTC Link ID Red Hat Product Errata RHSA-2023:2148
errata-xmlrpc 2023-05-09 07:50:59 UTC Link ID Red Hat Product Errata RHSA-2023:2458
errata-xmlrpc 2023-06-06 08:46:45 UTC Link ID Red Hat Product Errata RHSA-2023:3462
errata-xmlrpc 2023-06-06 08:49:04 UTC Link ID Red Hat Product Errata RHSA-2023:3461
errata-xmlrpc 2023-06-06 16:26:49 UTC Link ID Red Hat Product Errata RHSA-2023:3517
Mauro Matteo Cascella 2023-06-07 15:30:50 UTC Depends On 2213242, 2213243, 2213244
Red Hat Bugzilla 2023-07-07 08:35:40 UTC Assignee security-response-team nobody
errata-xmlrpc 2023-07-18 08:28:41 UTC Link ID Red Hat Product Errata RHSA-2023:4137
errata-xmlrpc 2023-07-18 08:28:50 UTC Link ID Red Hat Product Errata RHSA-2023:4138
errata-xmlrpc 2023-07-20 07:32:29 UTC Link ID Red Hat Product Errata RHSA-2023:4230
errata-xmlrpc 2023-08-08 07:54:19 UTC Link ID Red Hat Product Errata RHSA-2023:4541
errata-xmlrpc 2023-08-08 08:19:50 UTC Link ID Red Hat Product Errata RHSA-2023:4517
errata-xmlrpc 2023-08-08 08:20:03 UTC Link ID Red Hat Product Errata RHSA-2023:4531

Back to bug 2147364