VYPR
High severity8.8NVD Advisory· Published Mar 25, 2026· Updated Apr 24, 2026

CVE-2026-23395

CVE-2026-23395

Description

In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: Fix accepting multiple L2CAP_ECRED_CONN_REQ

Currently the code attempts to accept requests regardless of the command identifier which may cause multiple requests to be marked as pending (FLAG_DEFER_SETUP) which can cause more than L2CAP_ECRED_MAX_CID(5) to be allocated in l2cap_ecred_rsp_defer causing an overflow.

The spec is quite clear that the same identifier shall not be used on subsequent requests:

'Within each signaling channel a different Identifier shall be used for each successive request or indication.' https://www.bluetooth.com/wp-content/uploads/Files/Specification/HTML/Core-62/out/en/host/logical-link-control-and-adaptation-protocol-specification.html#UUID-32a25a06-4aa4-c6c7-77c5-dcfe3682355d

So this attempts to check if there are any channels pending with the same identifier and rejects if any are found.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A Bluetooth L2CAP vulnerability in the Linux kernel allows an unauthenticated attacker to cause a buffer overflow by sending multiple L2CAP_ECRED_CONN_REQ with the same identifier, potentially leading to code execution or system crash.

CVE-2026-23395 is a high-severity vulnerability in the Bluetooth L2CAP subsystem of the Linux kernel. The root cause is that the kernel fails to enforce the Bluetooth Core Specification requirement that each successive request or indication use a different command identifier [1][2]. When processing L2CAP_ECRED_CONN_REQ messages, the code marks channels as pending (FLAG_DEFER_SETUP) without checking whether the same identifier is already in use, allowing multiple requests with the same identifier to be accepted.

To exploit this vulnerability, an attacker needs to send multiple L2CAP_ECRED_CONN_REQ frames with an identical command identifier over a Bluetooth signaling channel. No authentication is required; the attack can be launched by any device within Bluetooth range that can establish an L2CAP connection. By sending such repeated requests, the attacker can cause the kernel to allocate more than L2CAP_ECRED_MAX_CID (5) channels in the l2cap_ecred_rsp_defer function, leading to an overflow of a fixed-size buffer [1][3].

The impact of this overflow includes memory corruption within the kernel. This can result in a denial of service (system crash) or, potentially, arbitrary code execution with kernel privileges. Given the CVSS v3 base score of 8.8, the vulnerability poses a serious threat to systems with Bluetooth enabled, especially in close-proximity attack scenarios.

The fix, introduced in multiple stable kernel commits, adds a check that rejects any new L2CAP_ECRED_CONN_REQ if there is already a pending channel with the same command identifier [1][2][3][4]. Users are advised to update their Linux kernels to the latest stable version containing this patch. There is no known workaround except disabling Bluetooth if patching is not immediately possible.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

10
  • Linux/Kernel10 versions
    cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 9 more
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=5.7.1,<5.10.253
    • cpe:2.3:o:linux:linux_kernel:5.7:-:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
    • (no CPE)

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.