Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:38886
HistoryJan 17, 2023 - 5:03 p.m.

Use-After-Free

2023-01-1717:03:57
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
29
linux
use-after-free
vulnerability
bluetooth
code execution
kernel memory
remote attacker
proximity

EPSS

0.001

Percentile

51.3%

linux is vulnerable to Use-After-Free. net/bluetooth/l2cap_core.c’s l2cap_connect and l2cap_le_connect_req functions may allow code execution and leak kernel memory remotely via Bluetooth, which allows a remote attacker to exploit the vulnerability via Bluetooth if they are within the proximity of the victim.