{"id":"CVE-2022-3564","details":"A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211087.","modified":"2026-04-03T13:14:36.198243169Z","published":"2022-10-17T19:15:10.187Z","related":["ALSA-2023:0951","ALSA-2023:0979","ALSA-2023:2736","ALSA-2023:2951","MGASA-2022-0442","MGASA-2022-0443","SUSE-SU-2023:0145-1","SUSE-SU-2023:0146-1","SUSE-SU-2023:0147-1","SUSE-SU-2023:0148-1","SUSE-SU-2023:0149-1","SUSE-SU-2023:0152-1","SUSE-SU-2023:0406-1","SUSE-SU-2023:0407-1","SUSE-SU-2023:0410-1","SUSE-SU-2023:0420-1","SUSE-SU-2023:0519-1","SUSE-SU-2023:0522-1","SUSE-SU-2023:0525-1","SUSE-SU-2023:0528-1","SUSE-SU-2023:0547-1","SUSE-SU-2023:0552-1","SUSE-SU-2023:0553-1","SUSE-SU-2023:0560-1","SUSE-SU-2023:0562-1","SUSE-SU-2023:0578-1","SUSE-SU-2023:0591-1","SUSE-SU-2023:0618-1","SUSE-SU-2023:0637-1","SUSE-SU-2025:01918-1","SUSE-SU-2025:01966-1","SUSE-SU-2025:01982-1","SUSE-SU-2025:01983-1","SUSE-SU-2025:01995-1","SUSE-SU-2025:02173-1","SUSE-SU-2025:02262-1"],"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20221223-0001/"},{"type":"ADVISORY","url":"https://vuldb.com/?id.211087"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=89f9f3cb86b1c63badaf392a83dd661d56cc50b1"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"3.6"},{"fixed":"4.9.333"}]},{"events":[{"introduced":"4.10"},{"fixed":"4.14.299"}]},{"events":[{"introduced":"4.15"},{"fixed":"4.19.265"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.4.224"}]},{"events":[{"introduced":"5.5.0"},{"fixed":"5.10.154"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.15.78"}]},{"events":[{"introduced":"5.16"},{"fixed":"6.0.8"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-3564.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}