0.0
NA
CVE-2023-54197
Revert "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work"
Description

In the Linux kernel, the following vulnerability has been resolved: Revert "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" This reverts commit 1e9ac114c4428fdb7ff4635b45d4f46017e8916f. This patch introduces a possible null-ptr-def problem. Revert it. And the fixed bug by this patch have resolved by commit 73f7b171b7c0 ("Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition").

INFO

Published Date :

Dec. 30, 2025, 1:16 p.m.

Last Modified :

Dec. 30, 2025, 1:16 p.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products

The following products are affected by CVE-2023-54197 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

No affected product recoded yet

Solution
Revert a faulty patch and apply the correct fix for the Bluetooth driver.
  • Revert the problematic commit from the kernel.
  • Apply the fix for the use-after-free bug.
  • Update the Linux kernel to the latest version.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2023-54197 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2023-54197 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2023-54197 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2023-54197 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Dec. 30, 2025

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: Revert "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" This reverts commit 1e9ac114c4428fdb7ff4635b45d4f46017e8916f. This patch introduces a possible null-ptr-def problem. Revert it. And the fixed bug by this patch have resolved by commit 73f7b171b7c0 ("Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition").
    Added Reference https://git.kernel.org/stable/c/0837d10f6c37a47a0c73bccf1e39513613a2fcc2
    Added Reference https://git.kernel.org/stable/c/3b4ed52009723f7dfca7a8ca95163bfb441bfb76
    Added Reference https://git.kernel.org/stable/c/70a104588e3131415e559c06deb834ce259a285a
    Added Reference https://git.kernel.org/stable/c/8f83fa62614c282dd5d1211a0dd99c6a0a515b81
    Added Reference https://git.kernel.org/stable/c/952030c914b5f2288609efe868537afcff7a3f51
    Added Reference https://git.kernel.org/stable/c/a789192f366147a0fbb395650079906d1d04e0b9
    Added Reference https://git.kernel.org/stable/c/d8d7ce037d9a8f1f0714ece268c4c2c50845bbc3
    Added Reference https://git.kernel.org/stable/c/db2bf510bd5d57f064d9e1db395ed86a08320c54
    Added Reference https://git.kernel.org/stable/c/de0ffb5145c9f418ad76f00e58d4b91c680410b2
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
No CVSS metrics available for this vulnerability.