The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-43322

CVE-2026-43322: Linux Kernel Use-After-Free Vulnerability

CVE-2026-43322 is a use-after-free vulnerability in the Linux Kernel Bluetooth subsystem that causes memory corruption. This article covers the technical details, affected versions, security impact, and mitigation strategies.

Published: May 18, 2026

CVE-2026-43322 Overview

CVE-2026-43322 is a use-after-free vulnerability [CWE-416] in the Linux kernel Bluetooth subsystem, specifically in the hci_sync host controller interface synchronization code. The flaw occurs in le_read_features_complete within net/bluetooth/hci_sync.c, where an hci_conn structure can be freed before the completion handler runs but after hci_le_read_remote_features_sync has executed. As a result, hci_conn_del -> hci_cmd_sync_dequeue fails to prevent access to the freed memory, leading to a slab use-after-free condition detected by KASAN.

Critical Impact

An adjacent-network attacker within Bluetooth range can trigger memory corruption in the kernel, potentially leading to denial of service or privilege escalation on affected Linux systems.

Affected Products

  • Linux Kernel (mainline, prior to fix commits 035c25007c9e and 260dc2be643b)
  • Linux Kernel 7.0-rc1 through 7.0-rc7 release candidates
  • Distributions shipping affected upstream kernels with Bluetooth Low Energy enabled

Discovery Timeline

  • 2026-05-08 - CVE-2026-43322 published to NVD
  • 2026-05-15 - Last updated in NVD database

Technical Details for CVE-2026-43322

Vulnerability Analysis

The vulnerability resides in the Bluetooth Low Energy (LE) connection handling logic of the Linux kernel. When the kernel issues an HCI command to read remote LE features via hci_le_read_remote_features_sync, the response is processed asynchronously by the le_read_features_complete callback running on the hci_cmd_sync_work workqueue. The associated hci_conn object can be freed by another path after the command has been dispatched but before the completion handler accesses it.

KASAN reporting shows the freed memory is accessed inside hci_conn_drop, which performs an atomic_dec_and_test on the connection refcount. The original allocation occurs in __hci_conn_add during le_conn_complete_evt event processing, and the free occurs through the device release path via kobject_put and device_release. The synchronization mechanism hci_cmd_sync_dequeue, intended to cancel pending commands when a connection is destroyed, fails to handle the race window where the command has already completed at the controller but the completion callback has not yet run.

Root Cause

The root cause is a race condition between connection teardown and asynchronous HCI command completion processing. The hci_conn reference held by the queued command does not properly extend the object's lifetime across the controller round-trip, allowing the connection to be torn down while a callback referencing it remains scheduled.

Attack Vector

Exploitation requires Bluetooth proximity to a vulnerable host with Bluetooth LE enabled. An attacker can trigger crafted LE connection sequences, including rapid connect and disconnect cycles, to force the race between feature-read command completion and connection destruction. The vulnerability does not require authentication or user interaction.

The vulnerability manifests in the connection lifetime tracking logic of net/bluetooth/hci_sync.c. See the upstream commit references for technical details of the fix that ensures hci_conn lifetime spans the duration of in-flight command completions.

Detection Methods for CVE-2026-43322

Indicators of Compromise

  • Kernel log entries containing KASAN: slab-use-after-free in le_read_features_complete or in hci_conn_drop
  • Unexpected kernel oops or panic traces referencing hci_cmd_sync_work and net/bluetooth/hci_sync.c
  • Bluetooth controller resets, repeated disconnects, or hci0 workqueue stalls without a benign cause

Detection Strategies

  • Enable KASAN on test and staging kernels to surface the use-after-free signature during fuzzing or regression testing
  • Audit kernel ring buffer output via dmesg for Bluetooth subsystem warnings around LE connection completion events
  • Correlate Bluetooth adapter telemetry with system stability events to identify abnormal connect/disconnect storms from nearby devices

Monitoring Recommendations

  • Forward journald and kmsg Bluetooth subsystem events to a centralized logging or SIEM pipeline for kernel crash signatures
  • Monitor for unauthorized Bluetooth pairing attempts and anomalous LE scanning activity in proximity to sensitive endpoints
  • Track installed kernel versions across the Linux fleet and alert when hosts run kernels predating the fix commits

How to Mitigate CVE-2026-43322

Immediate Actions Required

  • Apply the upstream kernel patches from commits 035c25007c9e698bef3826070ee34bb6d778020c and 260dc2be643b4a35b27008490c533613e3e53867 or upgrade to a kernel release that includes them
  • Disable the Bluetooth stack on systems that do not require it by unloading the bluetooth and btusb modules
  • Restrict physical and radio-frequency proximity access to high-value Linux endpoints until patches are deployed

Patch Information

The fix is available through the official Linux kernel stable tree. Refer to the Kernel.org Commit Update and the Kernel.org Commit Reference for the patches that correct the hci_conn lifetime handling in le_read_features_complete. Distribution maintainers should backport these commits to their supported kernel branches.

Workarounds

  • Disable Bluetooth at boot by blacklisting the bluetooth module in /etc/modprobe.d/ on systems that do not require wireless connectivity
  • Stop and mask the bluetooth.service unit using systemctl on systemd-based distributions to prevent the stack from loading
  • Limit LE advertising and connection acceptance through controller configuration on systems where Bluetooth must remain enabled
bash
# Configuration example
# Disable the Bluetooth kernel module persistently
echo "blacklist bluetooth" | sudo tee /etc/modprobe.d/disable-bluetooth.conf
echo "blacklist btusb" | sudo tee -a /etc/modprobe.d/disable-bluetooth.conf

# Stop and mask the Bluetooth service
sudo systemctl stop bluetooth.service
sudo systemctl mask bluetooth.service

# Verify the modules are not loaded
lsmod | grep -E "bluetooth|btusb"

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeUse After Free

  • Vendor/TechLinux

  • SeverityHIGH

  • CVSS Score8.8

  • EPSS Probability0.02%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-416
  • Vendor Resources
  • Kernel.org Commit Update

  • Kernel.org Commit Reference
  • Related CVEs
  • CVE-2026-43313: Linux Kernel Use-After-Free Vulnerability

  • CVE-2026-43297: Linux Kernel Use-After-Free Vulnerability

  • CVE-2026-43458: Linux Kernel Use-After-Free Vulnerability

  • CVE-2026-43427: Linux Kernel Use-After-Free Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English