A flaw was found in the Bluetooth subsystem of the Linux kernel. A race condition between the bt_sock_recvmsg() and bt_sock_ioctl() functions could lead to a use-after-free on a socket buffer ("skb"). A local user could exploit this vulnerability to cause a denial of service condition or potential code execution. Upstream fix: https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2256823]
This was fixed for Fedora with the 6.6.9 stable kernel updates.
*** Bug 2261903 has been marked as a duplicate of this bug. ***
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:2394 https://access.redhat.com/errata/RHSA-2024:2394
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:2950 https://access.redhat.com/errata/RHSA-2024:2950
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:3138 https://access.redhat.com/errata/RHSA-2024:3138
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:3854 https://access.redhat.com/errata/RHSA-2024:3854
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:3855 https://access.redhat.com/errata/RHSA-2024:3855
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2024:3859 https://access.redhat.com/errata/RHSA-2024:3859
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2024:10941 https://access.redhat.com/errata/RHSA-2024:10941