Updated: 2025-11-10 03:04:48.710111
Description:
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btrtl: Prevent potential NULL dereference The btrtl_initialize() function checks that rtl_load_file() either had an error or it loaded a zero length file. However, if it loaded a zero length file then the error code is not set correctly. It results in an error pointer vs NULL bug, followed by a NULL pointer dereference. This was detected by Smatch: drivers/bluetooth/btrtl.c:592 btrtl_initialize() warn: passing zero to 'ERR_PTR'
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | 0.0 | |
| CVSS Version 3.x | MEDIUM | 5.5 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| AlmaLinux 9.2 ESU | kernel | 5.14.0 | 5.5 | MEDIUM | Ignored | 2025-11-11 02:52:59 | This is a local-only NULL-dereference in the Realtek Bluetooth (btrtl) kernel driver that at worst t... | |
| Oracle Linux 7 ELS | kernel-uek | 5.4.17 | 5.5 | MEDIUM | Released | CLSA-2025:1757963029 | 2025-09-16 11:20:51 | |
| TuxCare 9.6 ESU | kernel | 5.14.0 | 5.5 | MEDIUM | Ignored | 2025-11-11 02:52:59 | This bug is a NULL pointer dereference confined to the Realtek Bluetooth (btrtl) driver’s firmware... | |
| Ubuntu 20.04 ELS | linux | 5.4.0 | 5.5 | MEDIUM | Ignored | 2025-11-11 02:54:08 |