CVE-2025-37792

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btrtl: Prevent potential NULL dereference The btrtl_initialize() function checks that rtl_load_file() either had an error or it loaded a zero length file. However, if it loaded a zero length file then the error code is not set correctly. It results in an error pointer vs NULL bug, followed by a NULL pointer dereference. This was detected by Smatch: drivers/bluetooth/btrtl.c:592 btrtl_initialize() warn: passing zero to 'ERR_PTR'
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

04 Nov 2025, 18:21

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-476
First Time Linux linux Kernel
Debian debian Linux
Linux
Debian
CPE cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/2d7c60c2a38b4b461fa960ad0995136a6bfe0756 - () https://git.kernel.org/stable/c/2d7c60c2a38b4b461fa960ad0995136a6bfe0756 - Patch
References () https://git.kernel.org/stable/c/324dddea321078a6eeb535c2bff5257be74c9799 - () https://git.kernel.org/stable/c/324dddea321078a6eeb535c2bff5257be74c9799 - Patch
References () https://git.kernel.org/stable/c/3db6605043b50c8bb768547b23e0222f67ceef3e - () https://git.kernel.org/stable/c/3db6605043b50c8bb768547b23e0222f67ceef3e - Patch
References () https://git.kernel.org/stable/c/53ceef799dcfc22c734d600811bfc9dd32eaea0a - () https://git.kernel.org/stable/c/53ceef799dcfc22c734d600811bfc9dd32eaea0a - Patch
References () https://git.kernel.org/stable/c/73dc99c0ea94abd22379b2d82cacbc73f3e18ec1 - () https://git.kernel.org/stable/c/73dc99c0ea94abd22379b2d82cacbc73f3e18ec1 - Patch
References () https://git.kernel.org/stable/c/aaf356f872a60db1e96fb762a62c4607fd22741f - () https://git.kernel.org/stable/c/aaf356f872a60db1e96fb762a62c4607fd22741f - Patch
References () https://git.kernel.org/stable/c/c3e9717276affe59fd8213706db021b493e81e34 - () https://git.kernel.org/stable/c/c3e9717276affe59fd8213706db021b493e81e34 - Patch
References () https://git.kernel.org/stable/c/d8441818690d795232331bd8358545c5c95b6b72 - () https://git.kernel.org/stable/c/d8441818690d795232331bd8358545c5c95b6b72 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List

03 Nov 2025, 20:18

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html -
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html -

02 May 2025, 13:53

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-01 14:15

Updated : 2025-11-04 18:21


NVD link : CVE-2025-37792

Mitre link : CVE-2025-37792

CVE.ORG link : CVE-2025-37792


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference