Updated: 2026-01-31 07:56:27.964798
Description:
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix use-after-free in l2cap_disconnect_{req,rsp} Similar to commit d0be8347c623 ("Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put"), just use l2cap_chan_hold_unless_zero to prevent referencing a channel that is about to be destroyed.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | NONE | 0.0 |
| CVSS Version 3.x | HIGH | 7.5 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| CentOS 7 ELS | kernel | 3.10.0 | 7.5 | HIGH | Released | CLSA-2026:1770040438 | 2026-02-10 13:39:50 | |
| Oracle Linux 7 ELS | kernel | 3.10.0 | 7.5 | HIGH | Released | CLSA-2026:1770028389 | 2026-02-02 14:59:19 | |
| RHEL 7 ELS | kernel | 3.10.0 | 7.5 | HIGH | Released | CLSA-2026:1770028764 | 2026-02-02 14:59:10 |