VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2023-54197

CVE-2023-54197

Description

In the Linux kernel, the following vulnerability has been resolved:

Revert "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work"

This reverts commit 1e9ac114c4428fdb7ff4635b45d4f46017e8916f.

This patch introduces a possible null-ptr-def problem. Revert it. And the fixed bug by this patch have resolved by commit 73f7b171b7c0 ("Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition").

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A revert of a previous fix in the Linux kernel's Bluetooth btsdio driver that itself introduced a null-pointer dereference; the original use-after-free is already fixed by a different commit.

Vulnerability

CVE-2023-54197 documents a revert of commit 1e9ac114c4428f77db7ff4635b45d4f46017e8916f in the Linux kernel's Bluetooth btsdio driver. The original commit was intended to fix a use-after a use-after-free bug in btsdio_remove caused by unfinished work, but it inadvertently introduced a possible null-pointer dereference (null-ptr-def) problem [1].

Exploitation

Exploitation

No specific exploitation scenario is described beyond the kernel code context. The vulnerability is a logic error path in driver removal; an attacker would need the ability to trigger the removal of a btsdio device (e.g., via hot-unplug or system shutdown) while work is still pending, leading to a null-pointer dereference in the kernel.

Impact

A successful trigger of the null-pointer dereference could cause a kernel crash (denial of service). The original use-after-free bug that the reverted patch attempted to fix has already been resolved by a separate commit 73f7b171b7c0 ("Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition") [1].

Mitigation

The fix is to revert the problematic commit. The stable kernel branches have applied this revert (commit db2bf510bd5d57f064d9e1db395ed86a08320c54) [1]. Users should update to a kernel version containing this revert to avoid the null-pointer dereference.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

9

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

9

News mentions

0

No linked articles in our index yet.