CVE-2023-54210Use After Free in Linux

CWE-416Use After Free7 documents6 sources
Severity
4.4MEDIUM
No vector
EPSS
0.0%
top 93.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_remove_adv_monitor() KASAN reports that there's a use-after-free in hci_remove_adv_monitor(). Trawling through the disassembly, you can see that the complaint is from the access in bt_dev_dbg() under the HCI_ADV_MONITOR_EXT_MSFT case. The problem case happens because msft_remove_monitor() can end up freeing the monitor structure. Specifically: hci_remove_adv_monitor() ->

Affected Packages4 packages

Linuxlinux/linux_kernel6.0.06.1.42+1
Debianlinux/linux_kernel< 6.1.52-1+2
CVEListV5linux/linux7cf5c2978f23fdbb2dd7b4e8b07e362ae2d8211c0d4d6b083da9b033ddccef72d77f373c819ae3ea+3
debiandebian/linux< linux 6.1.52-1 (bookworm)

🔴Vulnerability Details

3
OSV
Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_remove_adv_monitor()2025-12-30
OSV
CVE-2023-54210: In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_remove_adv_monitor() KASA2025-12-30
GHSA
GHSA-58q4-73m8-4p8p: In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_remove_adv_monitor() KA2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_remove_adv_monitor()2025-12-30
Debian
CVE-2023-54210: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54210 Impact, Exploitability, and Mitigation Steps | Wiz