CVE-2025-71082
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 3.7 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.4 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.160 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.120 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.64 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 3.7.1 (inc) to 5.15.198 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
The vulnerability can cause memory corruption or use-after-free errors in the Bluetooth USB driver when multiple interfaces are involved. This can lead to system instability, crashes, or potentially allow attackers to execute arbitrary code or cause denial of service via the Bluetooth subsystem.
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's Bluetooth USB driver (btusb). The issue arises because the driver uses devm_kzalloc() to allocate memory tied to a single interface's lifetime. When the driver binds to multiple interfaces, freeing memory for one interface prematurely frees data still used by other interfaces, leading to potential use-after-free or memory corruption. The fix was to revert to explicit memory management instead of devm_kzalloc().
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the btusb driver no longer uses devm_kzalloc for allocating btusb data and instead explicitly frees memory. This involves applying the patch that reverts the use of devm_kzalloc in btusb.c, ensuring proper memory management and preventing premature freeing of data used by multiple interfaces.