We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btrtl: Prevent potential NULL dereference The btrtl_initialize() function checks that rtl_load_file() either had an error or it loaded a zero length file. However, if it loaded a zero length file then the error code is not set correctly. It results in an error pointer vs NULL bug, followed by a NULL pointer dereference. This was detected by Smatch: drivers/bluetooth/btrtl.c:592 btrtl_initialize() warn: passing zero to 'ERR_PTR'
Reserved 2025-04-16 | Published 2025-05-01 | Updated 2025-05-26 | Assigner Linuxgit.kernel.org/...c/c3e9717276affe59fd8213706db021b493e81e34
git.kernel.org/...c/73dc99c0ea94abd22379b2d82cacbc73f3e18ec1
git.kernel.org/...c/2d7c60c2a38b4b461fa960ad0995136a6bfe0756
git.kernel.org/...c/d8441818690d795232331bd8358545c5c95b6b72
git.kernel.org/...c/3db6605043b50c8bb768547b23e0222f67ceef3e
git.kernel.org/...c/aaf356f872a60db1e96fb762a62c4607fd22741f
git.kernel.org/...c/53ceef799dcfc22c734d600811bfc9dd32eaea0a
git.kernel.org/...c/324dddea321078a6eeb535c2bff5257be74c9799
Support options