In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: btrtl: check for NULL in btrtl_setup_realtek()
If insert an USB dongle which chip is not maintained in ic_id_table, it
will hit the NULL point accessed. Add a null point check to avoid the
Kernel Oops.
Metrics
Affected Vendors & Products
References
History
Sat, 01 Mar 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
threat_severity
|
threat_severity
|
Fri, 28 Feb 2025 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Thu, 27 Feb 2025 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btrtl: check for NULL in btrtl_setup_realtek() If insert an USB dongle which chip is not maintained in ic_id_table, it will hit the NULL point accessed. Add a null point check to avoid the Kernel Oops. | |
Title | Bluetooth: btrtl: check for NULL in btrtl_setup_realtek() | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-02-27T02:07:11.114Z
Updated: 2025-05-04T10:07:47.250Z
Reserved: 2025-02-27T02:04:28.913Z
Link: CVE-2024-57987

No data.

Status : Received
Published: 2025-02-27T02:15:12.700
Modified: 2025-02-27T02:15:12.700
Link: CVE-2024-57987
