In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btrtl: check for NULL in btrtl_setup_realtek() If insert an USB dongle which chip is not maintained in ic_id_table, it will hit the NULL point accessed. Add a null point check to avoid the Kernel Oops.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://git.kernel.org/stable/c/1158ad8e8abb361d4b2aaa010c9af74de20ab82b | patch mailing list |
https://git.kernel.org/stable/c/02f9da874e5e4626f81772eacc18967921998a71 | patch mailing list |
https://git.kernel.org/stable/c/3c15082f3567032d196e8760753373332508c2ca | patch mailing list |