CVE-2023-53386

Source
https://cve.org/CVERecord?id=CVE-2023-53386
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53386.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53386
Downstream
Related
Published
2025-09-18T13:33:29.897Z
Modified
2026-03-20T12:33:07.873102Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Bluetooth: Fix potential use-after-free when clear keys
Details

In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix potential use-after-free when clear keys

Similar to commit c5d2b6fa26b5 ("Bluetooth: Fix use-after-free in hciremoveltk/hciremoveirk"). We can not access k after kfree_rcu() call.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53386.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d7d41682efc25d58b5bd8b80e85e3c9ce586635c
Fixed
e87da6a0ac6e631454e7da53a76aa9fe44aaa5dd
Fixed
942d8cefb022f384d5424f8b90c7878f3f93726f
Fixed
94617b736c25091b60e514e2e7aeafcbbee6b700
Fixed
da19f35868dfbecfff4f81166c054d2656cb1be4
Fixed
35cc42f04bc49f0656f6840cb7451b3df6049649
Fixed
3673952cf0c6cf81b06c66a0b788abeeb02ff3ae

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53386.json"