In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp conn->chan_lock isn't acquired before l2cap_get_chan_by_scid, if l2cap_get_chan_by_scid returns NULL, then 'bad unlock balance' is triggered.
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025091627-CVE-2023-53297-8746@gregkh/T
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:19103 https://access.redhat.com/errata/RHSA-2025:19103
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:19102 https://access.redhat.com/errata/RHSA-2025:19102