CVE-2026-43018
Use-After-Free in Linux Kernel Bluetooth Subsystem
Publication date: 2026-05-01
Last updated on: 2026-05-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's Bluetooth subsystem, specifically in the handling of the hci_le_remote_conn_param_req_evt event.
The issue is a potential Use-After-Free (UAF) condition caused by accessing a connection object (hci_conn) without proper locking (hdev lock). If the connection object is freed concurrently while being accessed, it can lead to undefined behavior or crashes.
The fix involves extending the critical section protected by the hci_dev_lock to cover all usage of the connection object, ensuring it cannot be freed while in use.
How can this vulnerability impact me? :
Exploitation of this vulnerability could lead to instability or crashes in the Bluetooth subsystem of the Linux kernel.
A Use-After-Free condition might be leveraged by an attacker to execute arbitrary code, cause denial of service, or trigger other unexpected behavior depending on the context.