{"id":"CVE-2023-53520","summary":"Bluetooth: Fix hci_suspend_sync crash","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Fix hci_suspend_sync crash\n\nIf hci_unregister_dev() frees the hci_dev object but hci_suspend_notifier\nmay still be accessing it, it can cause the program to crash.\nHere's the call trace:\n  \u003c4\u003e[102152.653246] Call Trace:\n  \u003c4\u003e[102152.653254]  hci_suspend_sync+0x109/0x301 [bluetooth]\n  \u003c4\u003e[102152.653259]  hci_suspend_dev+0x78/0xcd [bluetooth]\n  \u003c4\u003e[102152.653263]  hci_suspend_notifier+0x42/0x7a [bluetooth]\n  \u003c4\u003e[102152.653268]  notifier_call_chain+0x43/0x6b\n  \u003c4\u003e[102152.653271]  __blocking_notifier_call_chain+0x48/0x69\n  \u003c4\u003e[102152.653273]  __pm_notifier_call_chain+0x22/0x39\n  \u003c4\u003e[102152.653276]  pm_suspend+0x287/0x57c\n  \u003c4\u003e[102152.653278]  state_store+0xae/0xe5\n  \u003c4\u003e[102152.653281]  kernfs_fop_write+0x109/0x173\n  \u003c4\u003e[102152.653284]  __vfs_write+0x16f/0x1a2\n  \u003c4\u003e[102152.653287]  ? selinux_file_permission+0xca/0x16f\n  \u003c4\u003e[102152.653289]  ? security_file_permission+0x36/0x109\n  \u003c4\u003e[102152.653291]  vfs_write+0x114/0x21d\n  \u003c4\u003e[102152.653293]  __x64_sys_write+0x7b/0xdb\n  \u003c4\u003e[102152.653296]  do_syscall_64+0x59/0x194\n  \u003c4\u003e[102152.653299]  entry_SYSCALL_64_after_hwframe+0x5c/0xc1\n\nThis patch holds the reference count of the hci_dev object while\nprocessing it in hci_suspend_notifier to avoid potential crash\ncaused by the race condition.","modified":"2026-04-02T09:44:22.010722Z","published":"2025-10-01T11:46:07.355Z","related":["SUSE-SU-2025:03600-1","SUSE-SU-2025:03634-1","SUSE-SU-2025:20851-1","SUSE-SU-2025:20861-1","SUSE-SU-2025:20870-1","SUSE-SU-2025:20898-1","SUSE-SU-2025:3751-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4141-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53520.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/06e2b5ad72b60f90bfe565c201346532e271f484"},{"type":"WEB","url":"https://git.kernel.org/stable/c/573ebae162111063eedc6c838a659ba628f66a0f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e1fa25a91091bbed691ba2996a6cee809e3309a2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f9c8ce5d665653e3cf71a76349d41d7a7f7947e6"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53520.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53520"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"9952d90ea2885d7cbf80cd233f694f09a9c0eaec"},{"fixed":"e1fa25a91091bbed691ba2996a6cee809e3309a2"},{"fixed":"06e2b5ad72b60f90bfe565c201346532e271f484"},{"fixed":"f9c8ce5d665653e3cf71a76349d41d7a7f7947e6"},{"fixed":"573ebae162111063eedc6c838a659ba628f66a0f"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53520.json"}}],"schema_version":"1.7.5"}