CVE-2026-43119
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
06/05/2026
Última modificación:
06/05/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
Bluetooth: hci_sync: annotate data-races around hdev->req_status<br />
<br />
__hci_cmd_sync_sk() sets hdev->req_status under hdev->req_lock:<br />
<br />
hdev->req_status = HCI_REQ_PEND;<br />
<br />
However, several other functions read or write hdev->req_status without<br />
holding any lock:<br />
<br />
- hci_send_cmd_sync() reads req_status in hci_cmd_work (workqueue)<br />
- hci_cmd_sync_complete() reads/writes from HCI event completion<br />
- hci_cmd_sync_cancel() / hci_cmd_sync_cancel_sync() read/write<br />
- hci_abort_conn() reads in connection abort path<br />
<br />
Since __hci_cmd_sync_sk() runs on hdev->req_workqueue while<br />
hci_send_cmd_sync() runs on hdev->workqueue, these are different<br />
workqueues that can execute concurrently on different CPUs. The plain<br />
C accesses constitute a data race.<br />
<br />
Add READ_ONCE()/WRITE_ONCE() annotations on all concurrent accesses<br />
to hdev->req_status to prevent potential compiler optimizations that<br />
could affect correctness (e.g., load fusing in the wait_event<br />
condition or store reordering).



