Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1771 articles · 103891 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-23461EXPLOITEDPATCHED
linux · linux kernel

Bluetooth: L2CAP: Fix use-after-free in l2cap_unregister_user

Description

A vulnerability classified as critical was found in Linux Kernel up to 6.6.129/6.12.77/6.18.19/6.19.9/7.0-rc4. This vulnerability affects the function l2cap_conn_del of the component Bluetooth. Executing a manipulation can lead to use after free. This vulnerability appears as CVE-2026-23461. The attacker needs to be present on the local network. There is no available exploit. Upgrading the affected component is advised.

Affected Products

VendorProductVersions
linuxlinux kernelefc30877bd4bc85fefe98d80af60fafc86e5775e, f87271d21dd4ee83857ca11b94e7b4952749bbae, ab4eedb790cae44313759b50fe47da285e2519d5, ab4eedb790cae44313759b50fe47da285e2519d5, ab4eedb790cae44313759b50fe47da285e2519d5, 18ab6b6078fa8191ca30a3065d57bf35d5635761, 6.14, 6.6.129, 6.12.77, 6.18.19, 6.19.9, 7.0-rc4

References

  • https://git.kernel.org/stable/c/11a87dd5df428a4b79a84d2790cac7f3c73f1f0d
  • https://git.kernel.org/stable/c/c22a5e659959eb77c2fbb58a5adfaf3c3dab7abf
  • https://git.kernel.org/stable/c/da3000cbe4851458a22be38bb18c0689c39fdd5f
  • https://git.kernel.org/stable/c/71030f3b3015a412133a805ff47970cdcf30c2b8
  • https://git.kernel.org/stable/c/752a6c9596dd25efd6978a73ff21f3b592668f4a

Related News (2 articles)

Tier C
VulDB5h ago
CVE-2026-23461 | Linux Kernel up to 6.6.129/6.12.77/6.18.19/6.19.9/7.0-rc4 Bluetooth l2cap_conn_del use after free
→ No new info (linked only)
Tier C
Linux Kernel CVEs5h ago
CVE-2026-23461: Bluetooth: L2CAP: Fix use-after-free in l2cap_unregister_user
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
11a87dd5df428a4b79a84d2790cac7f3c73f1f0dc22a5e659959eb77c2fbb58a5adfaf3c3dab7abfda3000cbe4851458a22be38bb18c0689c39fdd5f71030f3b3015a412133a805ff47970cdcf30c2b8752a6c9596dd25efd6978a73ff21f3b592668f4a06.6.1306.12.786.18.206.19.107.0-rc5
PublishedApr 3, 2026
Last enriched4h agov2
Trending Score60
Source articles2
Independent2
Info Completeness7/14
Missing: cvss, epss, cwe, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-31393EXP
Bluetooth: L2CAP: Validate L2CAP_INFO_RSP payload length before access
Trending: 60
CRITICALCVE-2026-31397EXP
mm/huge_memory: fix use of NULL folio in move_pages_huge_pmd()
Trending: 60
CRITICALCVE-2026-23463EXP
soc: fsl: qbman: fix race condition in qman_destroy_fq
Trending: 60
CRITICALCVE-2026-23472EXP
serial: core: fix infinite loop in handle_tx() for PORT_UNKNOWN
Trending: 60
CRITICALCVE-2026-23438EXP
net: mvpp2: guard flow control update with global_tx_fc in buffer switching
Trending: 60

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 3, 2026
Discovered by ZDM
Apr 3, 2026
Actively Exploited
Apr 3, 2026
Patch Available
Apr 3, 2026
Updated: description, severity, affectedVersions, activelyExploited
Apr 3, 2026

Version History

v2
Last enriched 4h ago
v2Tier C4h ago

Updated severity to CRITICAL, added affected versions, and corrected exploit availability.

descriptionseverityaffectedVersionsactivelyExploited
via VulDB
v15h ago

Initial creation