First published: Thu Oct 20 2022(Updated: )
A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211918 is the identifier assigned to this vulnerability.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-477.10.1.rt7.274.el8_8 | 0:4.18.0-477.10.1.rt7.274.el8_8 |
redhat/kernel | <0:4.18.0-477.10.1.el8_8 | 0:4.18.0-477.10.1.el8_8 |
redhat/kernel | <0:5.14.0-284.11.1.el9_2 | 0:5.14.0-284.11.1.el9_2 |
redhat/kernel-rt | <0:5.14.0-284.11.1.rt14.296.el9_2 | 0:5.14.0-284.11.1.rt14.296.el9_2 |
Linux Linux kernel | ||
ubuntu/linux | <5.15.0-60.66 | 5.15.0-60.66 |
ubuntu/linux | <5.19.0-31.32 | 5.19.0-31.32 |
ubuntu/linux | <6.1.0-14.14 | 6.1.0-14.14 |
ubuntu/linux | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-aws | <5.15.0-1030.34 | 5.15.0-1030.34 |
ubuntu/linux-aws | <5.19.0-1019.20 | 5.19.0-1019.20 |
ubuntu/linux-aws | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-aws-5.0 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-aws-5.15 | <5.15.0-1030.34~20.04.1 | 5.15.0-1030.34~20.04.1 |
ubuntu/linux-aws-5.15 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-aws-5.4 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-aws-6.5 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-aws-fips | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-aws-hwe | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-azure | <5.15.0-1033.40 | 5.15.0-1033.40 |
ubuntu/linux-azure | <5.19.0-1020.21 | 5.19.0-1020.21 |
ubuntu/linux-azure | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-azure-4.15 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-azure-5.15 | <5.15.0-1033.40~20.04.1 | 5.15.0-1033.40~20.04.1 |
ubuntu/linux-azure-5.15 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-azure-5.4 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-azure-6.5 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-azure-edge | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-azure-fde | <5.15.0-1033.40.1 | 5.15.0-1033.40.1 |
ubuntu/linux-azure-fde | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-azure-fde-5.15 | <5.15.0-1033.40~20.04.1.1 | 5.15.0-1033.40~20.04.1.1 |
ubuntu/linux-azure-fde-5.15 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-azure-fips | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-bluefield | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-dell300x | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-fips | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-gcp | <5.15.0-1029.36 | 5.15.0-1029.36 |
ubuntu/linux-gcp | <5.19.0-1017.19 | 5.19.0-1017.19 |
ubuntu/linux-gcp | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-gcp-4.15 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-gcp-5.15 | <5.15.0-1029.36~20.04.1 | 5.15.0-1029.36~20.04.1 |
ubuntu/linux-gcp-5.15 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-gcp-5.4 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-gcp-6.5 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-gcp-fips | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-gke | <5.15.0-1027.32 | 5.15.0-1027.32 |
ubuntu/linux-gke | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-gke-4.15 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-gke-5.0 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-gke-5.15 | <5.15.0-1027.32~20.04.1 | 5.15.0-1027.32~20.04.1 |
ubuntu/linux-gke-5.15 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-gke-5.4 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-gkeop | <5.15.0-1015.19 | 5.15.0-1015.19 |
ubuntu/linux-gkeop | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-gkeop-5.15 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-gkeop-5.4 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-hwe | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-hwe-5.15 | <5.15.0-60.66~20.04.1 | 5.15.0-60.66~20.04.1 |
ubuntu/linux-hwe-5.15 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-hwe-5.19 | <5.19.0-32.33~22.04.1 | 5.19.0-32.33~22.04.1 |
ubuntu/linux-hwe-5.4 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-hwe-6.5 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-hwe-edge | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-ibm | <5.15.0-1025.28 | 5.15.0-1025.28 |
ubuntu/linux-ibm | <5.19.0-1017.19 | 5.19.0-1017.19 |
ubuntu/linux-ibm | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-ibm-5.15 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-ibm-5.4 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-intel | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-intel-5.13 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-intel-iotg | <5.15.0-1025.30 | 5.15.0-1025.30 |
ubuntu/linux-intel-iotg | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-intel-iotg-5.15 | <5.15.0-1025.30~20.04.1 | 5.15.0-1025.30~20.04.1 |
ubuntu/linux-intel-iotg-5.15 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-iot | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-kvm | <5.15.0-1028.33 | 5.15.0-1028.33 |
ubuntu/linux-kvm | <5.19.0-1018.19 | 5.19.0-1018.19 |
ubuntu/linux-kvm | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-laptop | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-lowlatency | <5.15.0-60.66 | 5.15.0-60.66 |
ubuntu/linux-lowlatency | <5.19.0-1017.18 | 5.19.0-1017.18 |
ubuntu/linux-lowlatency | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-lowlatency-hwe-5.15 | <5.15.0-60.66~20.04.1 | 5.15.0-60.66~20.04.1 |
ubuntu/linux-lowlatency-hwe-5.15 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-lowlatency-hwe-5.19 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-lowlatency-hwe-6.5 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-lts-xenial | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-nvidia | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-nvidia-6.5 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-nvidia-6.8 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-nvidia-lowlatency | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-oem | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-oem-5.10 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-oem-5.14 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-oem-5.17 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-oem-5.6 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-oem-6.0 | <6.0.0-1008.8 | 6.0.0-1008.8 |
ubuntu/linux-oem-6.0 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-oem-6.1 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-oem-6.5 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-oem-6.8 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-oem-osp1 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-oracle | <5.15.0-1029.35 | 5.15.0-1029.35 |
ubuntu/linux-oracle | <5.19.0-1017.20 | 5.19.0-1017.20 |
ubuntu/linux-oracle | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-oracle-5.0 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-oracle-5.13 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-oracle-5.15 | <5.15.0-1029.35~20.04.1 | 5.15.0-1029.35~20.04.1 |
ubuntu/linux-oracle-5.15 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-oracle-5.4 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-oracle-6.5 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-raspi | <5.15.0-1024.26 | 5.15.0-1024.26 |
ubuntu/linux-raspi | <5.19.0-1013.20 | 5.19.0-1013.20 |
ubuntu/linux-raspi | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-raspi-5.4 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-raspi2 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-riscv | <5.19.0-1013.14 | 5.19.0-1013.14 |
ubuntu/linux-riscv | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-riscv-5.15 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-riscv-6.5 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-snapdragon | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-starfive | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-starfive-6.5 | <6.1~<5.15.78 | 6.1~ 5.15.78 |
ubuntu/linux-xilinx-zynqmp | <6.1~<5.15.78 | 6.1~ 5.15.78 |
debian/linux | 5.10.218-1 5.10.221-1 6.1.94-1 6.1.99-1 6.9.12-1 6.10.3-1 |
To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the customer portal at https://access.redhat.com/solutions/268293. Alternatively, bluetooth can be disabled within the hardware or at the BIOS level, which will also provide effective mitigation as the kernel will not detect Bluetooth hardware on the system.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)