Updated: 2026-01-16 02:55:09.656887
Description:
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp conn->chan_lock isn't acquired before l2cap_get_chan_by_scid, if l2cap_get_chan_by_scid returns NULL, then 'bad unlock balance' is triggered.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | 0.0 | |
| CVSS Version 3.x | MEDIUM | 5.5 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| RHEL 7 ELS | kernel | 3.10.0 | 5.5 | MEDIUM | Released | CLSA-2026:1770028764 | 2026-01-19 17:16:10 | This bug is confined to the Bluetooth L2CAP disconnect-response path and is only reachable when the ... |
| Ubuntu 16.04 ELS | linux-hwe | 4.15.0 | 5.5 | MEDIUM | Ignored | 2026-01-16 09:27:53 | This flaw is confined to the Bluetooth L2CAP disconnect path and is only reachable when the Bluetoot... | |
| Ubuntu 16.04 ELS | linux | 4.4.0 | 5.5 | MEDIUM | Ignored | 2026-01-16 09:26:29 | This flaw is confined to the Bluetooth L2CAP disconnect path and is only reachable when the Bluetoot... | |
| Ubuntu 18.04 ELS | linux | 4.15.0 | 5.5 | MEDIUM | Ignored | 2026-01-16 09:26:30 | This flaw is confined to the Bluetooth L2CAP disconnect path and is only reachable when the Bluetoot... |