
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical vulnerability identified as CVE-2022-3640 was discovered in the Linux Kernel's Bluetooth subsystem. The vulnerability affects the l2capconndel function in the net/bluetooth/l2cap_core.c file. This use-after-free vulnerability was discovered in October 2022 and impacts various Linux distributions (CVE Mitre, NVD).
The vulnerability occurs in the Bluetooth L2CAP subsystem when l2caprecvframe() is invoked to receive data with cid L2CAPCIDA2MP. If the channel does not exist, it creates one without performing a hold operation, leaving the channel reference count at 1. When hcierrorreset() is triggered, l2capconndel() calls the A2MP close hook function to release the channel, leading to a use-after-free condition during l2capchanunlock(chan) (Kernel Commit).
The vulnerability could be exploited to cause a denial of service through system crash or memory corruption, or potentially lead to privilege escalation. The issue is particularly concerning for systems with Bluetooth capabilities enabled (Debian LTS).
The vulnerability has been patched in various Linux distributions. The fix involves adding a proper channel hold operation in the l2capdatachannel function. Users are recommended to update their kernel to the patched versions. For example, Debian 10 users should upgrade to linux-5.10 version 5.10.158-2~deb10u1, while Fedora users should upgrade to kernel version 6.0.8 (Debian LTS, Fedora Update).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."