SB2025091710 - Use-after-free in Linux kernel bluetooth
Published: September 17, 2025 Updated: September 22, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2023-53305)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the l2cap_le_command_rej() function in net/bluetooth/l2cap_core.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/149daab45922ab1ac7f0cbeacab7251a46bf5e63
- https://git.kernel.org/stable/c/1a40c56e8bff3e424724d78a9a6b3272dd8a371d
- https://git.kernel.org/stable/c/255be68150291440657b2cdb09420b69441af3d8
- https://git.kernel.org/stable/c/2958cf9f805b9f0bdc4a761bf6ea281eb8d44f8e
- https://git.kernel.org/stable/c/548a6b64b3c0688f01119a6fcccceb41f8c984e4
- https://git.kernel.org/stable/c/e76bab1b7afa580cd76362540fc37551ada4359b
- https://git.kernel.org/stable/c/f752a0b334bb95fe9b42ecb511e0864e2768046f
- https://git.kernel.org/stable/c/fe49aa73cca6608714477b74bfc6874b9db979df
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.255