CVE-2023-53762
BaseFortify
Publication date: 2025-12-08
Last updated on: 2025-12-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free (UAF) bug in the Linux kernel's Bluetooth subsystem, specifically in the hci_disconnect_all_sync function. It occurs when a Bluetooth connection is deleted concurrently by processing a controller event, leading to the code accessing memory that has already been freed. The issue was fixed by changing the iteration method over the connection list to prevent accessing freed memory.
How can this vulnerability impact me? :
The use-after-free vulnerability can cause the Linux kernel to crash or behave unpredictably when handling Bluetooth connections, potentially leading to denial of service or system instability. This could disrupt Bluetooth functionality and affect any applications or devices relying on Bluetooth connectivity.