
Cloud Vulnerability DB
A community-led vulnerabilities database
A use-after-free vulnerability (CVE-2022-20566) was discovered in the Linux kernel's Bluetooth implementation, specifically in the l2capchanput function of l2cap_core. The vulnerability was disclosed on December 16, 2022, affecting various Linux kernel versions across multiple distributions including Ubuntu and Android systems (Ubuntu Security, Red Hat Portal).
The vulnerability stems from improper locking mechanisms in the Bluetooth implementation of the Linux kernel, specifically in the l2capchanput function of l2cap_core. The issue involves a race condition that can occur while closing connections, potentially leading to a use-after-free condition. The vulnerability has been assigned a CVSS 3 Severity Score of 7.8 (High) (Ubuntu Security).
The vulnerability could allow a local attacker to cause a denial of service (system crash) or potentially execute arbitrary code on the affected system. The severity of the impact is heightened as it requires no additional execution privileges for exploitation (Ubuntu Security).
Multiple Linux distributions have released patches to address this vulnerability. Ubuntu has provided fixes across various kernel versions: Ubuntu 22.04 LTS (5.15.0-50.56), Ubuntu 20.04 LTS (5.4.0-128.144), Ubuntu 18.04 LTS (4.15.0-197.208), and Ubuntu 16.04 LTS (4.4.0-237.271). Users are advised to update their systems to the latest kernel versions and perform a system reboot after the update (Ubuntu Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."