CVE-2026-43059
Bluetooth: MGMT Use-After-Free and List Corruption Fix
Publication date: 2026-05-05
Last updated on: 2026-05-05
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's Bluetooth management code. It involves issues with handling pending commands in the Bluetooth MGMT interface, specifically related to list corruption and use-after-free (UAF) errors in command completion handlers.
A recent change introduced a function mgmt_pending_valid() that validates and unlinks pending commands from a list. However, some completion handlers were not updated accordingly, causing double removals from the list and freeing of commands that were still in use.
Two main problems were fixed: one where a command was removed twice from the list causing corruption and kernel panic, and another where commands were freed prematurely during error handling, leading to use-after-free conditions.
How can this vulnerability impact me? :
This vulnerability can lead to kernel list corruption and use-after-free errors in the Bluetooth management code of the Linux kernel.
Such issues can cause system instability, including kernel panics or crashes, which may result in denial of service or unpredictable behavior on affected systems.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved by a patch in the Linux kernel that fixes list corruption and use-after-free (UAF) issues in Bluetooth MGMT command complete handlers.
To mitigate this vulnerability, you should update your Linux kernel to a version that includes the fix described in commit 302a1f674c00 or later.