CVE-2022-50386

CVE Details

Release Date:2025-09-18
Impact:Moderate What is this?

Description


In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix user-after-free This uses l2cap_chan_hold_unless_zero() after calling __l2cap_get_chan_blah() to prevent the following trace: Bluetooth: l2cap_core.c:static void l2cap_chan_destroy(struct kref *kref) Bluetooth: chan 0000000023c4974d Bluetooth: parent 00000000ae861c08 ================================================================== BUG: KASAN: use-after-free in __mutex_waiter_is_first kernel/locking/mutex.c:191 [inline] BUG: KASAN: use-after-free in __mutex_lock_common kernel/locking/mutex.c:671 [inline] BUG: KASAN: use-after-free in __mutex_lock+0x278/0x400 kernel/locking/mutex.c:729 Read of size 8 at addr ffff888006a49b08 by task kworker/u3:2/389

See more information about CVE-2022-50386 from MITRE CVE dictionary and NIST NVD


NOTE: The following CVSS metrics and score provided are preliminary and subject to review.


CVSS v3 metrics

Base Score: 7.6
Vector String: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
Version: 3.1
Attack Vector: Adjacent_Network
Attack Complexity: Low
Privileges Required: Low
User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: Low
Availability Impact: High

Errata information


PlatformErrataRelease Date
Oracle Linux version 8 (kernel) ELSA-2025-191022025-10-27


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete