CVE-2023-54197
Unknown Unknown - Not Provided
Use-After-Free Vulnerability in Linux Bluetooth BTSdio Component

Publication date: 2025-12-30

Last updated on: 2025-12-30

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: Revert "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" This reverts commit 1e9ac114c4428fdb7ff4635b45d4f46017e8916f. This patch introduces a possible null-ptr-def problem. Revert it. And the fixed bug by this patch have resolved by commit 73f7b171b7c0 ("Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition").
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-30
Last Modified
2025-12-30
Generated
2026-05-07
AI Q&A
2025-12-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability relates to the Linux kernel's Bluetooth subsystem, specifically the btsdio driver. It involves a use-after-free bug in the btsdio_remove function caused by unfinished work and race conditions. A previous patch that attempted to fix this introduced a possible null pointer dereference problem, so it was reverted. The underlying use-after-free bug was later resolved by a different commit addressing the race condition.


How can this vulnerability impact me? :

The use-after-free bug in the Bluetooth driver could potentially lead to system instability or crashes when Bluetooth devices are removed, and might be exploitable to cause unintended behavior or security issues in the kernel. However, specific impacts or exploit scenarios are not detailed in the provided information.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart