CVE-2025-68298
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a NULL pointer dereference in the Linux kernel's Bluetooth Mediatek USB driver (btusb). Specifically, in the function btusb_mtk_setup(), a pointer (btmtk_data->isopkt_intf) can be set to NULL by the function usb_ifnum_to_if(). Despite this, the code proceeds to call btusb_mtk_claim_iso_intf() without checking if the pointer is NULL. After a certain commit, calling btusb_mtk_claim_iso_intf() with a NULL pointer causes a crash due to passing a bad pointer to device_lock(). The vulnerability is fixed by adding a NULL check at the start of btusb_mtk_claim_iso_intf(), preventing the crash.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update your Linux kernel to a version that includes the fix for the btusb Mediatek driver, specifically the commit e9087e828827 or later. This update adds a NULL check in btusb_mtk_claim_iso_intf() to prevent crashes caused by NULL pointer dereferences. Until the update is applied, avoid using affected Bluetooth Mediatek USB devices if possible.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash when the Bluetooth Mediatek USB driver encounters a NULL pointer dereference. This crash can lead to system instability or denial of service, as the kernel may panic or become unresponsive due to the invalid pointer access.