CVE-2025-71082

high

Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btusb: revert use of devm_kzalloc in btusb This reverts commit 98921dbd00c4e ("Bluetooth: Use devm_kzalloc in btusb.c file"). In btusb_probe(), we use devm_kzalloc() to allocate the btusb data. This ties the lifetime of all the btusb data to the binding of a driver to one interface, INTF. In a driver that binds to other interfaces, ISOC and DIAG, this is an accident waiting to happen. The issue is revealed in btusb_disconnect(), where calling usb_driver_release_interface(&btusb_driver, data->intf) will have devm free the data that is also being used by the other interfaces of the driver that may not be released yet. To fix this, revert the use of devm and go back to freeing memory explicitly.

References

https://git.kernel.org/stable/c/fdf7c640fb8a44a59b0671143d8c2f738bc48003

https://git.kernel.org/stable/c/cca0e9206e3bcc63cd3e72193e60149165d493cc

https://git.kernel.org/stable/c/c0ecb3e4451fe94f4315e6d09c4046dfbc42090b

https://git.kernel.org/stable/c/252714f1e8bdd542025b16321c790458014d6880

https://git.kernel.org/stable/c/1e54c19eaf84ba652c4e376571093e58e144b339

Details

Source: Mitre, NVD

Published: 2026-01-13

Updated: 2026-01-14

Risk Information

CVSS v2

Base Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 7.1

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

Severity: High

EPSS

EPSS: 0.00018