In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: btrtl: check for NULL in btrtl_setup_realtek()
If insert an USB dongle which chip is not maintained in ic_id_table, it
will hit the NULL point accessed. Add a null point check to avoid the
Kernel Oops.
References
| Link | Resource |
|---|---|
| https://git.kernel.org/stable/c/02f9da874e5e4626f81772eacc18967921998a71 | Mailing List Patch |
| https://git.kernel.org/stable/c/1158ad8e8abb361d4b2aaa010c9af74de20ab82b | Mailing List Patch |
| https://git.kernel.org/stable/c/3c15082f3567032d196e8760753373332508c2ca | Mailing List Patch |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-02-27 02:15
Updated : 2025-10-01 20:18
NVD link : CVE-2024-57987
Mitre link : CVE-2024-57987
CVE.ORG link : CVE-2024-57987
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
