CVE-2022-42896
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2022-42896 is a use-after-free vulnerability discovered in the Linux kernel's Bluetooth implementation, specifically in the net/bluetooth/l2capcore.c's l2capconnect and l2capleconnect_req functions. The vulnerability was disclosed on November 23, 2022, affecting Linux kernel's implementation of logical link control and adaptation protocol (L2CAP) (Ubuntu Security, NVD).

Technical details

The vulnerability exists in the Linux kernel's Bluetooth L2CAP handshake implementation, specifically related to the validation of SPSM (Simplified Protocol/Service Multiplexer) ranges. According to the Bluetooth Core Specification Version 5.3 | Vol 3, Part A page 1059, the valid range for SPSM should be from 0x0001-0x00ff. The vulnerability occurs when connection requests with invalid SPSM values are accepted (Linux Commit).

Impact

The vulnerability could allow a remote attacker within Bluetooth proximity to execute code and leak kernel memory. This poses a significant security risk as it could lead to unauthorized access to system resources and potential system compromise (CVE Mitre).

Mitigation and workarounds

The vulnerability has been patched in various Linux distributions. The fix involves adding proper validation checks for SPSM ranges in the L2CAP connection request handling. Users are recommended to upgrade their systems to the patched versions. For example, Ubuntu has released fixes for multiple versions including 22.04 LTS (5.15.0-58.64), 20.04 LTS (5.4.0-137.154), and 18.04 LTS (4.15.0-202.213) (Ubuntu Security).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management