{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T03:27:07.153","vulnerabilities":[{"cve":{"id":"CVE-2022-49138","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-02-26T07:00:51.047","lastModified":"2025-09-23T18:23:18.157","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_event: Ignore multiple conn complete events\n\nWhen one of the three connection complete events is received multiple\ntimes for the same handle, the device is registered multiple times which\nleads to memory corruptions. Therefore, consequent events for a single\nconnection are ignored.\n\nThe conn->state can hold different values, therefore HCI_CONN_HANDLE_UNSET\nis introduced to identify new connections. To make sure the events do not\ncontain this or another invalid handle HCI_CONN_HANDLE_MAX and checks\nare introduced.\n\nBuglink: https://bugzilla.kernel.org/show_bug.cgi?id=215497"},{"lang":"es","value":"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: hci_event: Ignorar varios eventos de conexión completa Cuando uno de los tres eventos de conexión completa se recibe varias veces para el mismo identificador, el dispositivo se registra varias veces, lo que provoca corrupciones de memoria. Por lo tanto, se ignoran los eventos consecuentes para una sola conexión. El estado conn-&gt;state puede contener diferentes valores, por lo tanto, se introduce HCI_CONN_HANDLE_UNSET para identificar nuevas conexiones. Para asegurarse de que los eventos no contengan este u otro identificador no válido, se introducen HCI_CONN_HANDLE_MAX y se realizan comprobaciones. Enlace de error: https://bugzilla.kernel.org/show_bug.cgi?id=215497"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.7,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.1,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-476"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.17.3","matchCriteriaId":"68AC7372-D098-4584-A82A-1F7CD731042F"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/aa1ca580e3ffe62a2c5ea1c095b609b2943c5269","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/d5ebaa7c5f6f688959e8d40840b2249ede63b8ed","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]}]}}]}