CVE-2026-23395 PUBLISHED

Bluetooth: L2CAP: Fix accepting multiple L2CAP_ECRED_CONN_REQ

Assigner: Linux
Reserved: 13.01.2026 Published: 25.03.2026 Updated: 25.03.2026

In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: Fix accepting multiple L2CAP_ECRED_CONN_REQ

Currently the code attempts to accept requests regardless of the command identifier which may cause multiple requests to be marked as pending (FLAG_DEFER_SETUP) which can cause more than L2CAP_ECRED_MAX_CID(5) to be allocated in l2cap_ecred_rsp_defer causing an overflow.

The spec is quite clear that the same identifier shall not be used on subsequent requests:

'Within each signaling channel a different Identifier shall be used for each successive request or indication.' https://www.bluetooth.com/wp-content/uploads/Files/Specification/HTML/Core-62/out/en/host/logical-link-control-and-adaptation-protocol-specification.html#UUID-32a25a06-4aa4-c6c7-77c5-dcfe3682355d

So this attempts to check if there are any channels pending with the same identifier and rejects if any are found.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 15f02b91056253e8cdc592888f431da0731337b8 to fb4a3a26483f3ea2cd21c7a2f7c45d5670600465 (excl.)
  • affected from 15f02b91056253e8cdc592888f431da0731337b8 to 2124d82fd25e1671bb3ceb37998af5aae5903e06 (excl.)
  • affected from 15f02b91056253e8cdc592888f431da0731337b8 to 6b949a6b33cbdf621d9fc6f0c48ac00915dbf514 (excl.)
  • affected from 15f02b91056253e8cdc592888f431da0731337b8 to 8d0d94f8ba5b3a0beec3b0da558b9bea48018117 (excl.)
  • affected from 15f02b91056253e8cdc592888f431da0731337b8 to e72ee455297b794b852e5cea8d2d7bb17312172a (excl.)
  • affected from 15f02b91056253e8cdc592888f431da0731337b8 to 5b3e2052334f2ff6d5200e952f4aa66994d09899 (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 5.7 is affected
  • unaffected from 0 to 5.7 (excl.)
  • unaffected from 6.1.167 to 6.1.* (incl.)
  • unaffected from 6.6.130 to 6.6.* (incl.)
  • unaffected from 6.12.78 to 6.12.* (incl.)
  • unaffected from 6.18.20 to 6.18.* (incl.)
  • unaffected from 6.19.10 to 6.19.* (incl.)
  • unaffected from 7.0-rc5 to * (incl.)

References