CVE-2022-50386

Source
https://cve.org/CVERecord?id=CVE-2022-50386
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50386.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50386
Downstream
Related
Published
2025-09-18T13:33:07.191Z
Modified
2026-03-12T03:26:27.942252Z
Severity
  • 8.0 (High) CVSS_V3 - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Bluetooth: L2CAP: Fix user-after-free
Details

In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: Fix user-after-free

This uses l2capchanholdunlesszero() after calling _l2capgetchanblah() to prevent the following trace:

Bluetooth: l2capcore.c:static void l2capchan_destroy(struct kref *kref) Bluetooth: chan 0000000023c4974d

Bluetooth: parent 00000000ae861c08

BUG: KASAN: use-after-free in __mutexwaiteris_first kernel/locking/mutex.c:191 [inline] BUG: KASAN: use-after-free in __mutexlockcommon kernel/locking/mutex.c:671 [inline] BUG: KASAN: use-after-free in _mutexlock+0x278/0x400 kernel/locking/mutex.c:729 Read of size 8 at addr ffff888006a49b08 by task kworker/u3:2/389

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50386.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3df91ea20e744344100b10ae69a17211fcf5b207
Fixed
11e40d6c0823f699d8ad501e48d1c3ae4be386cd
Fixed
843fc4e386dd84b806a7f07fb062d8c3a44e5364
Fixed
d91fc2836562f299f34e361e089e9fe154da4f73
Fixed
7d6f9cb24d2b2f6b6370eac074e2e6b1bafdad45
Fixed
0c108cf3ad386e0084277093b55a351c49e0be27
Fixed
d1e894f950ad48897d1a7cb05909ea29d8c3810e
Fixed
6ffde6e03085874ae22263ff4cef4869f797e84f
Fixed
15fc21695eb606bdc5d483b92118ee42610a952d
Fixed
35fcbc4243aad7e7d020b7c1dfb14bb888b20a4f

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50386.json"