VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2023-54214

CVE-2023-54214

Description

In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: Fix potential user-after-free

This fixes all instances of which requires to allocate a buffer calling alloc_skb which may release the chan lock and reacquire later which makes it possible that the chan is disconnected in the meantime.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A use-after-free vulnerability in the Linux kernel's Bluetooth L2CAP subsystem can occur when an allocation triggers a channel lock release, allowing a disconnect during the window.

Vulnerability

Overview

CVE-2023-54214 is a use-after-free vulnerability in the Linux kernel's Bluetooth L2CAP implementation. The root cause lies in the [1] is that certain code paths call alloc_skb to allocate a buffer, which may temporarily release the channel lock and reacquire it later. During this window, the channel can be disconnected, leading to a use-after-free condition when the code subsequently accesses the freed channel structure.

Exploitation

An attacker with the ability to trigger Bluetooth L2CAP operations on a vulnerable system can exploit this race condition. The attack requires the ability to initiate or influence L2CAP channel operations, potentially from a local unprivileged process or a nearby Bluetooth device. The vulnerability is triggered when a buffer allocation coincides with a channel disconnection, causing the code to operate on freed memory.

Impact

Successful exploitation could lead to memory corruption, system crash (denial of service), or potentially arbitrary code execution in the kernel context. The impact is limited to systems with the affected Linux kernel versions that have the Bluetooth L2CAP subsystem enabled.

Mitigation

The fix is included in stable kernel updates [1][2][3][4]. Users should apply the latest kernel updates from their distribution. No workaround is available other than disabling Bluetooth if not needed.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.