CVE-2023-53827
Description
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: L2CAP: Fix use-after-free in l2cap_disconnect_{req,rsp}
Similar to commit d0be8347c623 ("Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put"), just use l2cap_chan_hold_unless_zero to prevent referencing a channel that is about to be destroyed.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A use-after-free vulnerability in the Linux kernel's Bluetooth L2CAP subsystem can be triggered during disconnect requests, potentially leading to a crash or code execution.
Vulnerability
Description
A use-after-free vulnerability exists in the Linux kernel's Bluetooth L2CAP implementation, specifically in the l2cap_disconnect_req and l2cap_disconnect_rsp functions. The root cause is that the code could reference a channel that is about to be destroyed without properly holding a reference to it, leading to a use-after-free condition. This is similar to a previously fixed issue in commit d0be8347c623 ("Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put") [1].
Exploitation
The vulnerability can be exploited by an attacker who is able to send crafted Bluetooth L2CAP disconnect requests or responses to a target system. The attack requires Bluetooth communication capabilities. The attack does not require authentication, as it can be triggered by an unauthenticated remote attacker within Bluetooth range. The flaw is in the handling of channel references during the disconnect procedure, where the code fails to use l2cap_chan_hold_unless_zero to prevent accessing a channel that is being freed [1].
Impact
Successful exploitation could lead to a denial of service (system crash) or potentially allow an attacker to execute arbitrary code in the context of the kernel. The use-after-free condition can corrupt kernel memory, which may be leveraged for privilege escalation or other malicious purposes.
Mitigation
The vulnerability has been patched in the Linux kernel. The fix involves using l2cap_chan_hold_unless_zero to ensure that a reference is held before accessing the channel, preventing the use-after-free. Users should apply the latest stable kernel updates to address this issue [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
8f2d38e77aa5f1351551aa905c02421992505d9ba36c22a7bac6725a634f7348d446762e7d82a439c3cfda2a9339e1c9dVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/1351551aa9058e07a20a27a158270cf84fcde621nvd
- git.kernel.org/stable/c/348d446762e7c70778df8bafbdf3fa0df2123f58nvd
- git.kernel.org/stable/c/a2a9339e1c9deb7e1e079e12e27a0265aea8421anvd
- git.kernel.org/stable/c/ac6725a634f7e8c0330610a8527f20c730b61115nvd
- git.kernel.org/stable/c/c02421992505c95c7f3c9ad59ee35e22eac60988nvd
- git.kernel.org/stable/c/d82a439c3cfdb28aa7e82e2e849c5c4dd9fca284nvd
- git.kernel.org/stable/c/d9ba36c22a7bb09d6bac4cc2f243eff05da53f43nvd
- git.kernel.org/stable/c/f2d38e77aa5f3effc143e7dd24da8acf02925958nvd
News mentions
0No linked articles in our index yet.