CVE-2026-23299
Bluetooth: purge error queues in socket destructors
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: purge error queues in socket destructors When TX timestamping is enabled via SO_TIMESTAMPING, SKBs may be queued into sk_error_queue and will stay there until consumed. If userspace never gets to read the timestamps, or if the controller is removed unexpectedly, these SKBs will leak. Fix by adding skb_queue_purge() calls for sk_error_queue in affected bluetooth destructors. RFCOMM does not currently use sk_error_queue.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Mar 25, 2026 |
| Last Updated | Apr 13, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
134f4b39df7b77225a80ef585c15d46f964f5e6f < 2b6c942a526635f5c61d2f000258e620da32d3a7 134f4b39df7b77225a80ef585c15d46f964f5e6f < 3de7c10a950b36affc692d8bd2ac713852580e56 134f4b39df7b77225a80ef585c15d46f964f5e6f < 21e4271e65094172aadd5beb8caea95dd0fbf6d7
Linux / Linux
6.15