In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: btrtl: Prevent potential NULL dereference
The btrtl_initialize() function checks that rtl_load_file() either
had an error or it loaded a zero length file. However, if it loaded
a zero length file then the error code is not set correctly. It
results in an error pointer vs NULL bug, followed by a NULL pointer
dereference. This was detected by Smatch:
drivers/bluetooth/btrtl.c:592 btrtl_initialize() warn: passing zero to 'ERR_PTR'
Metrics
Affected Vendors & Products
References
History
Fri, 02 May 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Fri, 02 May 2025 06:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 01 May 2025 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btrtl: Prevent potential NULL dereference The btrtl_initialize() function checks that rtl_load_file() either had an error or it loaded a zero length file. However, if it loaded a zero length file then the error code is not set correctly. It results in an error pointer vs NULL bug, followed by a NULL pointer dereference. This was detected by Smatch: drivers/bluetooth/btrtl.c:592 btrtl_initialize() warn: passing zero to 'ERR_PTR' | |
Title | Bluetooth: btrtl: Prevent potential NULL dereference | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-05-01T13:07:24.882Z
Updated: 2025-05-02T06:16:31.893Z
Reserved: 2025-04-16T04:51:23.941Z
Link: CVE-2025-37792

No data.

Status : Awaiting Analysis
Published: 2025-05-01T14:15:43.660
Modified: 2025-05-02T13:53:20.943
Link: CVE-2025-37792
