There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim.
Created kernel tracking bugs for this issue:
Affects: fedora-all [bug 2148401]
This was fixed for Fedora with the 6.0.8 stable kernel updates.