{"id":"CVE-2026-43018","summary":"Bluetooth: hci_event: fix potential UAF in hci_le_remote_conn_param_req_evt","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_event: fix potential UAF in hci_le_remote_conn_param_req_evt\n\nhci_conn lookup and field access must be covered by hdev lock in\nhci_le_remote_conn_param_req_evt, otherwise it's possible it is freed\nconcurrently.\n\nExtend the hci_dev_lock critical section to cover all conn usage.","modified":"2026-05-18T06:00:12.010751671Z","published":"2026-05-01T14:15:22.308Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/43xxx/CVE-2026-43018.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1d0bdbfe3e91c11f0a704c52443a9446a10d699c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/59eecf0ffde15670e6a5e10c47be67f73d843b20"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5fb69e1eeea9d6cba80517e9f058b56b34bc3a81"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7cadb03be37e761130edb153544fe0770a842b19"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b255531b27da336571411248c2a72a350662bd09"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ea3cd36d7382d5f8309df04c275d20df139ed42c"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/43xxx/CVE-2026-43018.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-43018"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"95118dd4edfec950898a00180c6f998df0a6406d"},{"fixed":"59eecf0ffde15670e6a5e10c47be67f73d843b20"},{"fixed":"5fb69e1eeea9d6cba80517e9f058b56b34bc3a81"},{"fixed":"7cadb03be37e761130edb153544fe0770a842b19"},{"fixed":"1d0bdbfe3e91c11f0a704c52443a9446a10d699c"},{"fixed":"ea3cd36d7382d5f8309df04c275d20df139ed42c"},{"fixed":"b255531b27da336571411248c2a72a350662bd09"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-43018.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.17.0"},{"fixed":"6.1.168"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.134"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.81"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.18.22"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.19.0"},{"fixed":"6.19.12"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-43018.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}