SB20250226288 - Use-after-free in Linux kernel bluetooth
Published: February 26, 2025 Updated: May 11, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2022-49111)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the hci_disconn_phylink_complete_evt() function in net/bluetooth/hci_event.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/2cc803804ec9a296b3156855d6c8c4ca1c6b84be
- https://git.kernel.org/stable/c/3803d896ddd97c7c16689a5381c0960040727647
- https://git.kernel.org/stable/c/4da302b90b96c309987eb9b37c8547f939f042d2
- https://git.kernel.org/stable/c/643a6c26bd32e339d00ad97b8822b6db009e803c
- https://git.kernel.org/stable/c/684e505406abaeabe0058e9776f9210bf2747953
- https://git.kernel.org/stable/c/b3c2ea1fd444b3bb7b82bfd2c3a45418f85c2502
- https://git.kernel.org/stable/c/c41de54b0a963e59e4dd04c029a4a6d73f45ef9c
- https://git.kernel.org/stable/c/d404765dffdbd8dcd14758695d0c96c52fb2e624
- https://git.kernel.org/stable/c/f63d24baff787e13b723d86fe036f84bdbc35045
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.276
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.238
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.311
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.111
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.34
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.20
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.3
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.189