Bug 2396431 (CVE-2022-50386) - CVE-2022-50386 kernel: Bluetooth: L2CAP: Fix user-after-free
Summary: CVE-2022-50386 kernel: Bluetooth: L2CAP: Fix user-after-free
Keywords:
Status: NEW
Alias: CVE-2022-50386
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-09-18 14:04 UTC by OSIDB Bzimport
Modified: 2025-12-09 12:17 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2025:19102 0 None None None 2025-10-27 09:38:20 UTC
Red Hat Product Errata RHSA-2025:19103 0 None None None 2025-10-27 09:35:50 UTC
Red Hat Product Errata RHSA-2025:21083 0 None None None 2025-11-12 05:14:43 UTC
Red Hat Product Errata RHSA-2025:21091 0 None None None 2025-11-12 08:09:01 UTC
Red Hat Product Errata RHSA-2025:21136 0 None None None 2025-11-12 15:05:28 UTC
Red Hat Product Errata RHSA-2025:22006 0 None None None 2025-11-25 00:37:29 UTC
Red Hat Product Errata RHSA-2025:22095 0 None None None 2025-11-25 17:16:12 UTC
Red Hat Product Errata RHSA-2025:22124 0 None None None 2025-11-25 18:13:57 UTC
Red Hat Product Errata RHSA-2025:22752 0 None None None 2025-12-04 12:45:56 UTC
Red Hat Product Errata RHSA-2025:22910 0 None None None 2025-12-09 11:34:16 UTC
Red Hat Product Errata RHSA-2025:22914 0 None None None 2025-12-09 12:17:29 UTC

Description OSIDB Bzimport 2025-09-18 14:04:46 UTC
In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: Fix user-after-free

This uses l2cap_chan_hold_unless_zero() after calling
__l2cap_get_chan_blah() to prevent the following trace:

Bluetooth: l2cap_core.c:static void l2cap_chan_destroy(struct kref
*kref)
Bluetooth: chan 0000000023c4974d
Bluetooth: parent 00000000ae861c08
==================================================================
BUG: KASAN: use-after-free in __mutex_waiter_is_first
kernel/locking/mutex.c:191 [inline]
BUG: KASAN: use-after-free in __mutex_lock_common
kernel/locking/mutex.c:671 [inline]
BUG: KASAN: use-after-free in __mutex_lock+0x278/0x400
kernel/locking/mutex.c:729
Read of size 8 at addr ffff888006a49b08 by task kworker/u3:2/389

Comment 5 errata-xmlrpc 2025-10-27 09:35:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:19103 https://access.redhat.com/errata/RHSA-2025:19103

Comment 6 errata-xmlrpc 2025-10-27 09:38:19 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:19102 https://access.redhat.com/errata/RHSA-2025:19102

Comment 8 errata-xmlrpc 2025-11-12 05:14:42 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.8 Telecommunications Update Service

Via RHSA-2025:21083 https://access.redhat.com/errata/RHSA-2025:21083

Comment 9 errata-xmlrpc 2025-11-12 08:09:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2025:21091 https://access.redhat.com/errata/RHSA-2025:21091

Comment 10 errata-xmlrpc 2025-11-12 15:05:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2025:21136 https://access.redhat.com/errata/RHSA-2025:21136

Comment 11 errata-xmlrpc 2025-11-25 00:37:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2025:22006 https://access.redhat.com/errata/RHSA-2025:22006

Comment 12 errata-xmlrpc 2025-11-25 17:16:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2025:22095 https://access.redhat.com/errata/RHSA-2025:22095

Comment 13 errata-xmlrpc 2025-11-25 18:13:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2025:22124 https://access.redhat.com/errata/RHSA-2025:22124

Comment 14 errata-xmlrpc 2025-12-04 12:45:55 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On

Via RHSA-2025:22752 https://access.redhat.com/errata/RHSA-2025:22752

Comment 15 errata-xmlrpc 2025-12-09 11:34:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Extended Lifecycle Support

Via RHSA-2025:22910 https://access.redhat.com/errata/RHSA-2025:22910

Comment 16 errata-xmlrpc 2025-12-09 12:17:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Extended Lifecycle Support

Via RHSA-2025:22914 https://access.redhat.com/errata/RHSA-2025:22914


Note You need to log in before you can comment on or make changes to this bug.