A use-after-free flaw was found in the Linux kernel’s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
CPE | Name | Operator | Version |
---|---|---|---|
debian_linux | eq | 9.0 | |
debian_linux | eq | 10.0 | |
fedora | eq | 34 | |
linux_kernel | ge | 5.11 | |
linux_kernel | lt | 5.14.19 | |
linux_kernel | ge | 5.15 | |
linux_kernel | lt | 5.15.3 | |
linux_kernel | ge | 4.20 | |
linux_kernel | lt | 5.4.160 | |
linux_kernel | ge | 4.10 |
bugzilla.redhat.com/show_bug.cgi?id=1999544
lists.debian.org/debian-lts-announce/2022/03/msg00011.html
lists.debian.org/debian-lts-announce/2022/03/msg00012.html
lore.kernel.org/lkml/20211115165435.133245729%40linuxfoundation.org/
security.netapp.com/advisory/ntap-20220318-0009/
www.debian.org/security/2022/dsa-5096
www.openwall.com/lists/oss-security/2021/09/15/4
www.oracle.com/security-alerts/cpujul2022.html