In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_conn: fail SCO/ISO via hci_conn_failed if ACL gone early
Not calling hci_(dis)connect_cfm before deleting conn referred to by a
socket generally results to use-after-free.
When cleaning up SCO connections when the parent ACL is deleted too
early, use hci_conn_failed to do the connection cleanup properly.
We also need to clean up ISO connections in a similar situation when
connecting has started but LE Create CIS is not yet sent, so do it too
here.
References
Configurations
Configuration 1 (hide)
|
History
12 Dec 2025, 17:27
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:6.4:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.4:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.4:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.4:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.4:rc6:*:*:*:*:*:* |
|
| CWE | CWE-416 | |
| First Time |
Linux
Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| References | () https://git.kernel.org/stable/c/3344d318337d9dca928fd448e966557ec5063f85 - Patch | |
| References | () https://git.kernel.org/stable/c/397d58007532644b35fad746da48c41161f32a57 - Patch | |
| References | () https://git.kernel.org/stable/c/e94b898463a62b72a2a8b75dea8936bf4db78e00 - Patch |
18 Sep 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-18 14:15
Updated : 2025-12-12 17:27
NVD link : CVE-2023-53374
Mitre link : CVE-2023-53374
CVE.ORG link : CVE-2023-53374
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
