
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-42896 is a use-after-free vulnerability discovered in the Linux kernel's Bluetooth implementation, specifically in the net/bluetooth/l2capcore.c's l2capconnect and l2capleconnect_req functions. The vulnerability was disclosed on November 23, 2022, affecting Linux kernel's implementation of logical link control and adaptation protocol (L2CAP) (Ubuntu Security, NVD).
The vulnerability exists in the Linux kernel's Bluetooth L2CAP handshake implementation, specifically related to the validation of SPSM (Simplified Protocol/Service Multiplexer) ranges. According to the Bluetooth Core Specification Version 5.3 | Vol 3, Part A page 1059, the valid range for SPSM should be from 0x0001-0x00ff. The vulnerability occurs when connection requests with invalid SPSM values are accepted (Linux Commit).
The vulnerability could allow a remote attacker within Bluetooth proximity to execute code and leak kernel memory. This poses a significant security risk as it could lead to unauthorized access to system resources and potential system compromise (CVE Mitre).
The vulnerability has been patched in various Linux distributions. The fix involves adding proper validation checks for SPSM ranges in the L2CAP connection request handling. Users are recommended to upgrade their systems to the patched versions. For example, Ubuntu has released fixes for multiple versions including 22.04 LTS (5.15.0-58.64), 20.04 LTS (5.4.0-137.154), and 18.04 LTS (4.15.0-202.213) (Ubuntu Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."