CVE-2022-50386

Source
https://cve.org/CVERecord?id=CVE-2022-50386
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50386.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50386
Downstream
Related
Published
2025-09-18T13:33:07.191Z
Modified
2026-04-11T12:44:57.087483Z
Severity
  • 8.0 (High) CVSS_V3 - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Bluetooth: L2CAP: Fix user-after-free
Details

In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: Fix user-after-free

This uses l2capchanholdunlesszero() after calling _l2capgetchanblah() to prevent the following trace:

Bluetooth: l2capcore.c:static void l2capchan_destroy(struct kref *kref) Bluetooth: chan 0000000023c4974d

Bluetooth: parent 00000000ae861c08

BUG: KASAN: use-after-free in __mutexwaiteris_first kernel/locking/mutex.c:191 [inline] BUG: KASAN: use-after-free in __mutexlockcommon kernel/locking/mutex.c:671 [inline] BUG: KASAN: use-after-free in _mutexlock+0x278/0x400 kernel/locking/mutex.c:729 Read of size 8 at addr ffff888006a49b08 by task kworker/u3:2/389

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50386.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3df91ea20e744344100b10ae69a17211fcf5b207
Fixed
11e40d6c0823f699d8ad501e48d1c3ae4be386cd
Fixed
843fc4e386dd84b806a7f07fb062d8c3a44e5364
Fixed
d91fc2836562f299f34e361e089e9fe154da4f73
Fixed
7d6f9cb24d2b2f6b6370eac074e2e6b1bafdad45
Fixed
0c108cf3ad386e0084277093b55a351c49e0be27
Fixed
d1e894f950ad48897d1a7cb05909ea29d8c3810e
Fixed
6ffde6e03085874ae22263ff4cef4869f797e84f
Fixed
15fc21695eb606bdc5d483b92118ee42610a952d
Fixed
35fcbc4243aad7e7d020b7c1dfb14bb888b20a4f

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50386.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.4.0
Fixed
4.9.331
Type
ECOSYSTEM
Events
Introduced
4.10.0
Fixed
4.14.296
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.262
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.220
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.150
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.75
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.19.17
Type
ECOSYSTEM
Events
Introduced
5.20.0
Fixed
6.0.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50386.json"