Vulnerability Name: | CVE-2022-42896 (CCN-240820) | ||||||||||||||||
Assigned: | 2022-11-02 | ||||||||||||||||
Published: | 2022-11-02 | ||||||||||||||||
Updated: | 2023-03-01 | ||||||||||||||||
Summary: | Linux Kernel could allow a remote attacker from within the local network to execute arbitrary code on the system, caused by multiple use-after-free vulnerabilities in the net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions. By using Bluetooth within proximity of the victim, an attacker could exploit this vulnerability to execute arbitrary code on the system and leak kernel memory. | ||||||||||||||||
CVSS v3 Severity: | 8.0 High (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N) 7.0 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C)
4.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||
CVSS v2 Severity: | 5.2 Medium (CCN CVSS v2 Vector: AV:A/AC:L/Au:S/C:P/I:P/A:P)
| ||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-42896 Source: XF Type: UNKNOWN linux-kernel-cve202242896-code-exec(240820) Source: CCN Type: Linux Kernel GIT Repository Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM Source: cve-coordination@google.com Type: Patch, Third Party Advisory cve-coordination@google.com Source: cve-coordination@google.com Type: Patch, Vendor Advisory cve-coordination@google.com | ||||||||||||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |