CVE-2023-53252Use After Free in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 97.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 15

Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: use RCU for hci_conn_params and iterate safely in hci_sync hci_update_accept_list_sync iterates over hdev->pend_le_conns and hdev->pend_le_reports, and waits for controller events in the loop body, without holding hdev lock. Meanwhile, these lists and the items may be modified e.g. by le_scan_cleanup. This can invalidate the list cursor or any other item in the list, resulting to invalid behavior (eg use-after-free

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel5.176.1.42+2
Debianlinux/linux_kernel< 6.1.52-1+2
CVEListV5linux/linuxe8907f76544ffe225ab95d70f7313267b1d0c76d13ad45ad14df992a6754a130a19abc8c142d54e2+3
debiandebian/linux< linux 6.1.52-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-r8x4-762h-wj65: In the Linux kernel, the following vulnerability has been resolved: Bluetooth: use RCU for hci_conn_params and iterate safely in hci_sync hci_update2025-09-15
OSV
CVE-2023-53252: In the Linux kernel, the following vulnerability has been resolved: Bluetooth: use RCU for hci_conn_params and iterate safely in hci_sync hci_update_a2025-09-15

📋Vendor Advisories

2
Red Hat
kernel: Bluetooth: use RCU for hci_conn_params and iterate safely in hci_sync2025-09-15
Debian
CVE-2023-53252: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ...2023
CVE-2023-53252 — Use After Free in Linux | cvebase