{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-68298","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-12-16T14:48:05.293Z","datePublished":"2025-12-16T15:06:17.526Z","dateUpdated":"2026-05-11T21:50:27.516Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:50:27.516Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btusb: mediatek: Avoid btusb_mtk_claim_iso_intf() NULL deref\n\nIn btusb_mtk_setup(), we set `btmtk_data->isopkt_intf` to:\n  usb_ifnum_to_if(data->udev, MTK_ISO_IFNUM)\n\nThat function can return NULL in some cases. Even when it returns\nNULL, though, we still go on to call btusb_mtk_claim_iso_intf().\n\nAs of commit e9087e828827 (\"Bluetooth: btusb: mediatek: Add locks for\nusb_driver_claim_interface()\"), calling btusb_mtk_claim_iso_intf()\nwhen `btmtk_data->isopkt_intf` is NULL will cause a crash because\nwe'll end up passing a bad pointer to device_lock(). Prior to that\ncommit we'd pass the NULL pointer directly to\nusb_driver_claim_interface() which would detect it and return an\nerror, which was handled.\n\nResolve the crash in btusb_mtk_claim_iso_intf() by adding a NULL check\nat the start of the function. This makes the code handle a NULL\n`btmtk_data->isopkt_intf` the same way it did before the problematic\ncommit (just with a slight change to the error message printed)."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/bluetooth/btusb.c"],"versions":[{"version":"930e1790b99e5839e1af69d2f7fd808f1fba2df9","lessThan":"2fa09fe98ca3b114d66285f65f7e108fea131815","status":"affected","versionType":"git"},{"version":"e9087e828827e5a5c85e124ce77503f2b81c3491","lessThan":"c3b990e0b23068da65f0004cd38ee31f43f36460","status":"affected","versionType":"git"},{"version":"e9087e828827e5a5c85e124ce77503f2b81c3491","lessThan":"c884a0b27b4586e607431d86a1aa0bb4fb39169c","status":"affected","versionType":"git"},{"version":"4194766ec8756f4f654d595ae49962acbac49490","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/bluetooth/btusb.c"],"versions":[{"version":"6.14","status":"affected"},{"version":"0","lessThan":"6.14","status":"unaffected","versionType":"semver"},{"version":"6.12.61","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.17.11","lessThanOrEqual":"6.17.*","status":"unaffected","versionType":"semver"},{"version":"6.18","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.12.13","versionEndExcluding":"6.12.61"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.14","versionEndExcluding":"6.17.11"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.14","versionEndExcluding":"6.18"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.13.2"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/2fa09fe98ca3b114d66285f65f7e108fea131815"},{"url":"https://git.kernel.org/stable/c/c3b990e0b23068da65f0004cd38ee31f43f36460"},{"url":"https://git.kernel.org/stable/c/c884a0b27b4586e607431d86a1aa0bb4fb39169c"}],"title":"Bluetooth: btusb: mediatek: Avoid btusb_mtk_claim_iso_intf() NULL deref","x_generator":{"engine":"bippy-1.2.0"}}}}