CVE-2023-54214 — Use After Free in Linux
Severity
5.8MEDIUM
No vectorEPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 30
Description
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: L2CAP: Fix potential user-after-free
This fixes all instances of which requires to allocate a buffer calling
alloc_skb which may release the chan lock and reacquire later which
makes it possible that the chan is disconnected in the meantime.
Affected Packages4 packages
▶CVEListV5linux/linuxa6a5568c03c4805d4d250f6bd9d468eeeb4ea059 — b2fde8cb2a25125111f2144604e0e7c0ebcc4bba+8
🔴Vulnerability Details
3GHSA▶
GHSA-c5c6-fj3h-jwh2: In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: L2CAP: Fix potential user-after-free
This fixes all instances of whic↗2025-12-30
OSV▶
CVE-2023-54214: In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix potential user-after-free This fixes all instances of which↗2025-12-30