CVE-2025-71082
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
13/01/2026
Última modificación:
13/01/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
Bluetooth: btusb: revert use of devm_kzalloc in btusb<br />
<br />
This reverts commit 98921dbd00c4e ("Bluetooth: Use devm_kzalloc in<br />
btusb.c file").<br />
<br />
In btusb_probe(), we use devm_kzalloc() to allocate the btusb data. This<br />
ties the lifetime of all the btusb data to the binding of a driver to<br />
one interface, INTF. In a driver that binds to other interfaces, ISOC<br />
and DIAG, this is an accident waiting to happen.<br />
<br />
The issue is revealed in btusb_disconnect(), where calling<br />
usb_driver_release_interface(&btusb_driver, data->intf) will have devm<br />
free the data that is also being used by the other interfaces of the<br />
driver that may not be released yet.<br />
<br />
To fix this, revert the use of devm and go back to freeing memory<br />
explicitly.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/1e54c19eaf84ba652c4e376571093e58e144b339
- https://git.kernel.org/stable/c/252714f1e8bdd542025b16321c790458014d6880
- https://git.kernel.org/stable/c/c0ecb3e4451fe94f4315e6d09c4046dfbc42090b
- https://git.kernel.org/stable/c/cca0e9206e3bcc63cd3e72193e60149165d493cc
- https://git.kernel.org/stable/c/fdf7c640fb8a44a59b0671143d8c2f738bc48003



