CVE-2026-43019

high

Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_conn: fix potential UAF in set_cig_params_sync hci_conn lookup and field access must be covered by hdev lock in set_cig_params_sync, otherwise it's possible it is freed concurrently. Take hdev lock to prevent hci_conn from being deleted or modified concurrently. Just RCU lock is not suitable here, as we also want to avoid "tearing" in the configuration.

References

https://git.kernel.org/stable/c/bad65b4b0a96139f023eadc28a33125963208449

https://git.kernel.org/stable/c/a2639a7f0f5bf7d73f337f8f077c19415c62ed2c

https://git.kernel.org/stable/c/7d568fede8eac91161a60b710aa920abe9b0fb9f

https://git.kernel.org/stable/c/66d432e9b45bae7881ffcdb12cd8fd0bf254ef02

Details

Source: Mitre, NVD

Published: 2026-05-01

Updated: 2026-05-03

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 7.8

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High

EPSS

EPSS: 0.00018