Updated: 2026-01-16 02:55:09.656887
Description:
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp conn->chan_lock isn't acquired before l2cap_get_chan_by_scid, if l2cap_get_chan_by_scid returns NULL, then 'bad unlock balance' is triggered.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | 0.0 | |
| CVSS Version 3.x | MEDIUM | 5.5 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| AlmaLinux 9.2 ESU | kernel | 5.14.0 | 5.5 | MEDIUM | Released | CLSA-2025:1760546935 | 2025-10-15 20:23:45 | |
| CentOS 6 ELS | kernel | 2.6.32 | 5.5 | MEDIUM | Ignored | 2025-12-18 19:38:45 | ||
| CentOS 7 ELS | kernel | 3.10.0 | 5.5 | MEDIUM | Released | CLSA-2026:1770040438 | 2026-02-10 14:16:01 | This bug is confined to the Bluetooth L2CAP disconnect-response path and is only reachable when the ... |
| CentOS 8.4 ELS | kernel | 4.18.0 | 5.5 | MEDIUM | Released | CLSA-2025:1763731262 | 2025-11-21 21:29:43 | |
| CentOS 8.5 ELS | kernel | 4.18.0 | 5.5 | MEDIUM | Released | CLSA-2025:1763734783 | 2025-11-21 21:29:44 | |
| CentOS Stream 8 ELS | kernel | 4.18.0 | 5.5 | MEDIUM | In Testing | 2025-11-06 23:33:37 | ||
| CloudLinux 7 ELS | kernel | 3.10.0 | 5.5 | MEDIUM | Ignored | 2025-12-24 04:22:29 | This bug is confined to the Bluetooth L2CAP disconnect-response path and is only reachable when the ... | |
| Oracle Linux 6 ELS | kernel | 2.6.32 | 5.5 | MEDIUM | Ignored | 2025-12-18 19:38:44 | ||
| Oracle Linux 7 ELS | kernel | 3.10.0 | 5.5 | MEDIUM | Released | CLSA-2026:1770028389 | 2026-01-19 17:16:12 | This bug is confined to the Bluetooth L2CAP disconnect-response path and is only reachable when the ... |
| Oracle Linux 7 ELS | kernel-uek | 5.4.17 | 5.5 | MEDIUM | Ignored | 2025-12-24 04:22:40 | This bug is confined to the Bluetooth L2CAP disconnect-response path and is only reachable when the ... |