CVE-2026-43059
Awaiting Analysis Awaiting Analysis - Queue
Bluetooth: MGMT Use-After-Free and List Corruption Fix

Publication date: 2026-05-05

Last updated on: 2026-05-05

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix list corruption and UAF in command complete handlers Commit 302a1f674c00 ("Bluetooth: MGMT: Fix possible UAFs") introduced mgmt_pending_valid(), which not only validates the pending command but also unlinks it from the pending list if it is valid. This change in semantics requires updates to several completion handlers to avoid list corruption and memory safety issues. This patch addresses two left-over issues from the aforementioned rework: 1. In mgmt_add_adv_patterns_monitor_complete(), mgmt_pending_remove() is replaced with mgmt_pending_free() in the success path. Since mgmt_pending_valid() already unlinks the command at the beginning of the function, calling mgmt_pending_remove() leads to a double list_del() and subsequent list corruption/kernel panic. 2. In set_mesh_complete(), the use of mgmt_pending_foreach() in the error path is removed. Since the current command is already unlinked by mgmt_pending_valid(), this foreach loop would incorrectly target other pending mesh commands, potentially freeing them while they are still being processed concurrently (leading to UAFs). The redundant mgmt_cmd_status() is also simplified to use cmd->opcode directly.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-05
Last Modified
2026-05-05
Generated
2026-05-07
AI Q&A
2026-05-05
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is in the Linux kernel's Bluetooth management code. It involves issues with handling pending commands in the Bluetooth MGMT interface, specifically related to list corruption and use-after-free (UAF) errors in command completion handlers.

A recent change introduced a function mgmt_pending_valid() that validates and unlinks pending commands from a list. However, some completion handlers were not updated accordingly, causing double removals from the list and freeing of commands that were still in use.

Two main problems were fixed: one where a command was removed twice from the list causing corruption and kernel panic, and another where commands were freed prematurely during error handling, leading to use-after-free conditions.


How can this vulnerability impact me? :

This vulnerability can lead to kernel list corruption and use-after-free errors in the Bluetooth management code of the Linux kernel.

Such issues can cause system instability, including kernel panics or crashes, which may result in denial of service or unpredictable behavior on affected systems.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability has been resolved by a patch in the Linux kernel that fixes list corruption and use-after-free (UAF) issues in Bluetooth MGMT command complete handlers.

To mitigate this vulnerability, you should update your Linux kernel to a version that includes the fix described in commit 302a1f674c00 or later.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart