{"id":"CVE-2025-38641","summary":"Bluetooth: btusb: Fix potential NULL dereference on kmalloc failure","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btusb: Fix potential NULL dereference on kmalloc failure\n\nAvoid potential NULL pointer dereference by checking the return value of\nkmalloc and handling allocation failure properly.","modified":"2026-04-02T12:48:03.814498Z","published":"2025-08-22T16:00:47.492Z","database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38641.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/5029d80bfc30b60ff57c70ccb04e027acb404f6a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b505902c66a282dcb01bcdc015aa1fdfaaa075db"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38641.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38641"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"7d70989fcea7f79afe018a7e34d3486406c7a94e"},{"fixed":"5029d80bfc30b60ff57c70ccb04e027acb404f6a"},{"fixed":"b505902c66a282dcb01bcdc015aa1fdfaaa075db"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38641.json"}}],"schema_version":"1.7.5"}