In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: btrtl: check for NULL in btrtl_setup_realtek()
If insert an USB dongle which chip is not maintained in ic_id_table, it
will hit the NULL point accessed. Add a null point check to avoid the
Kernel Oops.
                
            References
                    | Link | Resource | 
|---|---|
| https://git.kernel.org/stable/c/02f9da874e5e4626f81772eacc18967921998a71 | Mailing List Patch | 
| https://git.kernel.org/stable/c/1158ad8e8abb361d4b2aaa010c9af74de20ab82b | Mailing List Patch | 
| https://git.kernel.org/stable/c/3c15082f3567032d196e8760753373332508c2ca | Mailing List Patch | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    01 Oct 2025, 20:18
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-476 | |
| Summary | 
 | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 5.5 | 
| References | () https://git.kernel.org/stable/c/02f9da874e5e4626f81772eacc18967921998a71 - Mailing List, Patch | |
| References | () https://git.kernel.org/stable/c/1158ad8e8abb361d4b2aaa010c9af74de20ab82b - Mailing List, Patch | |
| References | () https://git.kernel.org/stable/c/3c15082f3567032d196e8760753373332508c2ca - Mailing List, Patch | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| First Time | Linux linux Kernel Linux | 
27 Feb 2025, 02:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-02-27 02:15
Updated : 2025-10-01 20:18
NVD link : CVE-2024-57987
Mitre link : CVE-2024-57987
CVE.ORG link : CVE-2024-57987
JSON object : View
Products Affected
                linux
- linux_kernel
CWE
                
                    
                        
                        CWE-476
                        
            NULL Pointer Dereference
