A flaw found in the Linux Kernel bluetooth. In l2cap_chan_put of l2cap_core, there is a possible use after free due to improper locking. Happens during sock_close() when being called l2cap_chan_put(). This could lead to local escalation of privilege. The issue actual if patch ef191aded58c5 "Bluetooth: Restore locking semantics when looking up L2CAP channels" already applied. Reference: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d0be8347c623e0ac4202a1d4e0373882821f56b0
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2173627]
This was fixed for Fedora with the 5.18.16 stable kernel update.