SB2025092215 - Use-after-free in Linux kernel bluetooth
Published: September 22, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2025-39860)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the l2cap_sock_release() function in net/bluetooth/l2cap_sock.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/2ca99fc3512a8074de20ee52a87b492dfcc41a4d
- https://git.kernel.org/stable/c/306b0991413b482dbf5585b423022123bb505966
- https://git.kernel.org/stable/c/3dff390f55ccd9ce12e91233849769b5312180c2
- https://git.kernel.org/stable/c/47f6090bcf75c369695d21c3f179db8a56bbbd49
- https://git.kernel.org/stable/c/6077d16b5c0f65d571eee709de2f0541fb5ef0ca
- https://git.kernel.org/stable/c/83e1d9892ef51785cf0760b7681436760dda435a
- https://git.kernel.org/stable/c/862c628108562d8c7a516a900034823b381d3cba
- https://git.kernel.org/stable/c/964cbb198f9c46c2b2358cd1faffc04c1e8248cf