CVE-2023-53297
BaseFortify
Publication date: 2025-09-16
Last updated on: 2025-12-02
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | to 4.14.316 (exc) |
| linux | linux_kernel | From 4.15 (inc) to 4.19.284 (exc) |
| linux | linux_kernel | From 4.20 (inc) to 5.4.244 (exc) |
| linux | linux_kernel | From 5.5 (inc) to 5.10.181 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.113 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.30 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.3.4 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's Bluetooth L2CAP component involves a 'bad unlock balance' error. Specifically, the conn->chan_lock is not acquired before calling l2cap_get_chan_by_scid. If l2cap_get_chan_by_scid returns NULL, it triggers an improper unlocking sequence, which is referred to as a 'bad unlock balance'.
How can this vulnerability impact me? :
The vulnerability could lead to instability or unexpected behavior in the Bluetooth subsystem of the Linux kernel due to improper lock handling. This might cause crashes or denial of service conditions, potentially affecting system reliability.