CVE-2024-57987

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btrtl: check for NULL in btrtl_setup_realtek() If insert an USB dongle which chip is not maintained in ic_id_table, it will hit the NULL point accessed. Add a null point check to avoid the Kernel Oops.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

01 Oct 2025, 20:18

Type Values Removed Values Added
CWE CWE-476
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: btrtl: verificación de NULL en btrtl_setup_realtek() Si se inserta un dispositivo USB cuyo chip no se mantiene en ic_id_table, se alcanzará el punto NULL al que se accedió. Agregue una verificación de punto nulo para evitar el error de kernel.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/02f9da874e5e4626f81772eacc18967921998a71 - () https://git.kernel.org/stable/c/02f9da874e5e4626f81772eacc18967921998a71 - Mailing List, Patch
References () https://git.kernel.org/stable/c/1158ad8e8abb361d4b2aaa010c9af74de20ab82b - () https://git.kernel.org/stable/c/1158ad8e8abb361d4b2aaa010c9af74de20ab82b - Mailing List, Patch
References () https://git.kernel.org/stable/c/3c15082f3567032d196e8760753373332508c2ca - () https://git.kernel.org/stable/c/3c15082f3567032d196e8760753373332508c2ca - Mailing List, Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux

27 Feb 2025, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-27 02:15

Updated : 2025-10-01 20:18


NVD link : CVE-2024-57987

Mitre link : CVE-2024-57987

CVE.ORG link : CVE-2024-57987


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference