First published: Tue Apr 01 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Add check for mgmt_alloc_skb() in mgmt_remote_name() Add check for the return value of mgmt_alloc_skb() in mgmt_remote_name() to prevent null pointer dereference.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=5.17.2<6.1.131 | |
Linux Kernel | >=6.2<6.6.83 | |
Linux Kernel | >=6.7<6.12.19 | |
Linux Kernel | >=6.13<6.13.7 | |
Linux Kernel | =6.14-rc1 | |
Linux Kernel | =6.14-rc2 | |
Linux Kernel | =6.14-rc3 | |
Linux Kernel | =6.14-rc4 | |
Linux Kernel | =6.14-rc5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-21937 is classified as high due to the risk of a null pointer dereference affecting Bluetooth functionality.
To fix CVE-2025-21937, update to the latest version of the Linux kernel that includes the patch addressing this vulnerability.
Potential impacts of CVE-2025-21937 include system crashes and denial of service due to null pointer dereference in Bluetooth services.
CVE-2025-21937 affects certain versions of the Linux kernel before the patch was applied, specifically those utilizing Bluetooth management functions.
Yes, CVE-2025-21937 is exploitable remotely, potentially allowing an attacker to trigger a denial of service through Bluetooth connections.