In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: vhci: Prevent use-after-free by removing debugfs files early
Move the creation of debugfs files into a dedicated function, and ensure
they are explicitly removed during vhci_release(), before associated
data structures are freed.
Previously, debugfs files such as "force_suspend", "force_wakeup", and
others were created under hdev->debugfs but not removed in
vhci_release(). Since vhci_release() frees the backing vhci_data
structure, any access to these files after release would result in
use-after-free errors.
Although hdev->debugfs is later freed in hci_release_dev(), user can
access files after vhci_data is freed but before hdev->debugfs is
released.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-09-19 16:15
Updated : 2026-01-14 20:16
NVD link : CVE-2025-39861
Mitre link : CVE-2025-39861
CVE.ORG link : CVE-2025-39861
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
