CVE-2026-43018
Published: Fri, 01 May 2026 15:16
Summary
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: fix potential UAF in hci_le_remote_conn_param_req_evt hci_conn lookup and field access must be covered by hd
Details
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: fix potential UAF in hci_le_remote_conn_param_req_evt hci_conn lookup and field access must be covered by hdev lock in hci_le_remote_conn_param_req_evt, otherwise it's possible it is freed concurrently. Extend the hci_dev_lock critical section to cover all conn usage.
Are YOU affected by CVE-2026-43018?
5-second check on your actual server. Reads /etc/os-release, uname -r, and dpkg-query; matches against the live USN + Debian Security Tracker feeds; tells you whether CVE-2026-43018 (and any other live CVE) applies. Anonymous, no signup.
curl https://mindsparkstack.com/scan.sh | bash
References
- https://git.kernel.org/stable/c/1d0bdbfe3e91c11f0a704c52443a9446a10d699c
- https://git.kernel.org/stable/c/59eecf0ffde15670e6a5e10c47be67f73d843b20
- https://git.kernel.org/stable/c/5fb69e1eeea9d6cba80517e9f058b56b34bc3a81
- https://git.kernel.org/stable/c/7cadb03be37e761130edb153544fe0770a842b19
- https://git.kernel.org/stable/c/b255531b27da336571411248c2a72a350662bd09
- https://git.kernel.org/stable/c/ea3cd36d7382d5f8309df04c275d20df139ed42c
StackPatch runs this match against YOUR installed packages every hour
Free 1-server / $99 lifetime founder seat (50 only) / $19+/mo monthly. Indie pricing.