A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088.
The product utilizes multiple threads or processes to allow temporary access to a shared resource that can only be exclusive to one process at a time, but it does not properly synchronize these actions, which might cause simultaneous accesses of this resource by multiple threads or processes.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Linux_kernel | Linux | 2.6.27 (including) | 4.9.331 (excluding) |
Linux_kernel | Linux | 4.10 (including) | 4.14.296 (excluding) |
Linux_kernel | Linux | 4.15 (including) | 4.19.262 (excluding) |
Linux_kernel | Linux | 4.20 (including) | 5.4.220 (excluding) |
Linux_kernel | Linux | 5.5 (including) | 5.10.150 (excluding) |
Linux_kernel | Linux | 5.11 (including) | 5.15.75 (excluding) |
Linux_kernel | Linux | 5.16 (including) | 5.19.17 (excluding) |
Linux_kernel | Linux | 6.0 (including) | 6.0.3 (excluding) |
Synchronization refers to a variety of behaviors and mechanisms that allow two or more independently-operating processes or threads to ensure that they operate on shared resources in predictable ways that do not interfere with each other. Some shared resource operations cannot be executed atomically; that is, multiple steps must be guaranteed to execute sequentially, without any interference by other processes. Synchronization mechanisms vary widely, but they may include locking, mutexes, and semaphores. When a multi-step operation on a shared resource cannot be guaranteed to execute independent of interference, then the resulting behavior can be unpredictable. Improper synchronization could lead to data or memory corruption, denial of service, etc.