A use-after-free flaw was found in the Linux kernel’s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
[
{
"product": "kernel",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "kernel 5.15.3"
}
]
}
]
bugzilla.redhat.com/show_bug.cgi?id=1999544
lists.debian.org/debian-lts-announce/2022/03/msg00011.html
lists.debian.org/debian-lts-announce/2022/03/msg00012.html
lore.kernel.org/lkml/20211115165435.133245729%40linuxfoundation.org/
security.netapp.com/advisory/ntap-20220318-0009/
www.debian.org/security/2022/dsa-5096
www.openwall.com/lists/oss-security/2021/09/15/4
www.oracle.com/security-alerts/cpujul2022.html