๐Ÿ” CVE Alert

CVE-2022-48947

UNKNOWN 0.0

Bluetooth: L2CAP: Fix u8 overflow

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix u8 overflow By keep sending L2CAP_CONF_REQ packets, chan->num_conf_rsp increases multiple times and eventually it will wrap around the maximum number (i.e., 255). This patch prevents this by adding a boundary check with L2CAP_MAX_CONF_RSP Btmon log: Bluetooth monitor ver 5.64 = Note: Linux version 6.1.0-rc2 (x86_64) 0.264594 = Note: Bluetooth subsystem version 2.22 0.264636 @ MGMT Open: btmon (privileged) version 1.22 {0x0001} 0.272191 = New Index: 00:00:00:00:00:00 (Primary,Virtual,hci0) [hci0] 13.877604 @ RAW Open: 9496 (privileged) version 2.22 {0x0002} 13.890741 = Open Index: 00:00:00:00:00:00 [hci0] 13.900426 (...) > ACL Data RX: Handle 200 flags 0x00 dlen 1033 #32 [hci0] 14.273106 invalid packet size (12 != 1033) 08 00 01 00 02 01 04 00 01 10 ff ff ............ > ACL Data RX: Handle 200 flags 0x00 dlen 1547 #33 [hci0] 14.273561 invalid packet size (14 != 1547) 0a 00 01 00 04 01 06 00 40 00 00 00 00 00 ........@..... > ACL Data RX: Handle 200 flags 0x00 dlen 2061 #34 [hci0] 14.274390 invalid packet size (16 != 2061) 0c 00 01 00 04 01 08 00 40 00 00 00 00 00 00 04 ........@....... > ACL Data RX: Handle 200 flags 0x00 dlen 2061 #35 [hci0] 14.274932 invalid packet size (16 != 2061) 0c 00 01 00 04 01 08 00 40 00 00 00 07 00 03 00 ........@....... = bluetoothd: Bluetooth daemon 5.43 14.401828 > ACL Data RX: Handle 200 flags 0x00 dlen 1033 #36 [hci0] 14.275753 invalid packet size (12 != 1033) 08 00 01 00 04 01 04 00 40 00 00 00 ........@...

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
f2fcfcd670257236ebf2088bbdf26f6a8ef459fe < 49d5867819ab7c744852b45509e8469839c07e0e f2fcfcd670257236ebf2088bbdf26f6a8ef459fe < 95f1847a361c7b4bf7d74c06ecb6968455082c1a f2fcfcd670257236ebf2088bbdf26f6a8ef459fe < ad528fde0702903208d0a79d88d5a42ae3fc235b f2fcfcd670257236ebf2088bbdf26f6a8ef459fe < 9fdc79b571434af7bc742da40a3405f038b637a7 f2fcfcd670257236ebf2088bbdf26f6a8ef459fe < f3fe6817156a2ad4b06f01afab04638a34d7c9a6 f2fcfcd670257236ebf2088bbdf26f6a8ef459fe < 19a78143961a197de8502f4f29c453b913dc3c29 f2fcfcd670257236ebf2088bbdf26f6a8ef459fe < 5550bbf709c323194881737fd290c4bada9e6ead f2fcfcd670257236ebf2088bbdf26f6a8ef459fe < bcd70260ef56e0aee8a4fc6cd214a419900b0765
Linux / Linux
2.6.32

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/49d5867819ab7c744852b45509e8469839c07e0e git.kernel.org: https://git.kernel.org/stable/c/95f1847a361c7b4bf7d74c06ecb6968455082c1a git.kernel.org: https://git.kernel.org/stable/c/ad528fde0702903208d0a79d88d5a42ae3fc235b git.kernel.org: https://git.kernel.org/stable/c/9fdc79b571434af7bc742da40a3405f038b637a7 git.kernel.org: https://git.kernel.org/stable/c/f3fe6817156a2ad4b06f01afab04638a34d7c9a6 git.kernel.org: https://git.kernel.org/stable/c/19a78143961a197de8502f4f29c453b913dc3c29 git.kernel.org: https://git.kernel.org/stable/c/5550bbf709c323194881737fd290c4bada9e6ead git.kernel.org: https://git.kernel.org/stable/c/bcd70260ef56e0aee8a4fc6cd214a419900b0765