{"id":"CVE-2025-71082","summary":"Bluetooth: btusb: revert use of devm_kzalloc in btusb","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btusb: revert use of devm_kzalloc in btusb\n\nThis reverts commit 98921dbd00c4e (\"Bluetooth: Use devm_kzalloc in\nbtusb.c file\").\n\nIn btusb_probe(), we use devm_kzalloc() to allocate the btusb data. This\nties the lifetime of all the btusb data to the binding of a driver to\none interface, INTF. In a driver that binds to other interfaces, ISOC\nand DIAG, this is an accident waiting to happen.\n\nThe issue is revealed in btusb_disconnect(), where calling\nusb_driver_release_interface(&btusb_driver, data-\u003eintf) will have devm\nfree the data that is also being used by the other interfaces of the\ndriver that may not be released yet.\n\nTo fix this, revert the use of devm and go back to freeing memory\nexplicitly.","modified":"2026-03-31T17:29:40.154112Z","published":"2026-01-13T15:34:46.301Z","related":["MGASA-2026-0017","MGASA-2026-0018","SUSE-SU-2026:0447-1","SUSE-SU-2026:0472-1","SUSE-SU-2026:0473-1","SUSE-SU-2026:0587-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20555-1","SUSE-SU-2026:20599-1","SUSE-SU-2026:20615-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","openSUSE-SU-2026:20287-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71082.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1e54c19eaf84ba652c4e376571093e58e144b339"},{"type":"WEB","url":"https://git.kernel.org/stable/c/252714f1e8bdd542025b16321c790458014d6880"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c0ecb3e4451fe94f4315e6d09c4046dfbc42090b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cca0e9206e3bcc63cd3e72193e60149165d493cc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fdf7c640fb8a44a59b0671143d8c2f738bc48003"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fff9206b0907252a41eb12b7c1407b9347df18b1"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71082.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-71082"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"98921dbd00c4e2e4bdd56423cb5edf98d57b45f7"},{"fixed":"fff9206b0907252a41eb12b7c1407b9347df18b1"},{"fixed":"cca0e9206e3bcc63cd3e72193e60149165d493cc"},{"fixed":"c0ecb3e4451fe94f4315e6d09c4046dfbc42090b"},{"fixed":"1e54c19eaf84ba652c4e376571093e58e144b339"},{"fixed":"fdf7c640fb8a44a59b0671143d8c2f738bc48003"},{"fixed":"252714f1e8bdd542025b16321c790458014d6880"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-71082.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"3.7.0"},{"fixed":"5.15.198"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.160"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.120"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.64"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.18.4"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-71082.json"}}],"schema_version":"1.7.5"}