CVE-2025-68298

Source
https://cve.org/CVERecord?id=CVE-2025-68298
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68298.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-68298
Downstream
Published
2025-12-16T15:06:17.526Z
Modified
2026-03-13T04:06:17.243895Z
Summary
Bluetooth: btusb: mediatek: Avoid btusb_mtk_claim_iso_intf() NULL deref
Details

In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btusb: mediatek: Avoid btusbmtkclaimisointf() NULL deref

In btusbmtksetup(), we set btmtk_data->isopkt_intf to: usbifnumtoif(data->udev, MTKISO_IFNUM)

That function can return NULL in some cases. Even when it returns NULL, though, we still go on to call btusbmtkclaimisointf().

As of commit e9087e828827 ("Bluetooth: btusb: mediatek: Add locks for usbdriverclaiminterface()"), calling btusbmtkclaimisointf() when btmtk_data->isopkt_intf is NULL will cause a crash because we'll end up passing a bad pointer to devicelock(). Prior to that commit we'd pass the NULL pointer directly to usbdriverclaim_interface() which would detect it and return an error, which was handled.

Resolve the crash in btusbmtkclaimisointf() by adding a NULL check at the start of the function. This makes the code handle a NULL btmtk_data->isopkt_intf the same way it did before the problematic commit (just with a slight change to the error message printed).

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68298.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
930e1790b99e5839e1af69d2f7fd808f1fba2df9
Fixed
2fa09fe98ca3b114d66285f65f7e108fea131815
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e9087e828827e5a5c85e124ce77503f2b81c3491
Fixed
c3b990e0b23068da65f0004cd38ee31f43f36460
Fixed
c884a0b27b4586e607431d86a1aa0bb4fb39169c
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
4194766ec8756f4f654d595ae49962acbac49490

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68298.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.12.61
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.17.11

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68298.json"