CVE-2025-40283
Description
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF
There is a KASAN: slab-use-after-free read in btusb_disconnect(). Calling "usb_driver_release_interface(&btusb_driver, data->intf)" will free the btusb data associated with the interface. The same data is then used later in the function, hence the UAF.
Fix by moving the accesses to btusb data to before the data is free'd.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A use-after-free in the Linux kernel's Bluetooth btusb driver occurs when btusb_disconnect() frees data then accesses it; fixed by reordering cleanup.
The vulnerability is a use-after-free (UAF) in the btusb_disconnect() function of the Linux kernel's Bluetooth USB driver (btusb). The function calls usb_driver_release_interface() which frees the btusb data structure associated with the interface. However, after this call, the function continues to access the same freed data, leading to a slab-use-after-free condition as detected by KASAN [1][2][3].
Exploitation requires local access to the system and the ability to trigger a disconnect of a Bluetooth USB device. An attacker with physical access or control over a Bluetooth adapter could potentially cause the driver to disconnect, triggering the UAF. No special privileges are needed beyond the ability to interact with USB devices.
The impact is a use-after-free read, which can lead to memory corruption and potentially privilege escalation. An attacker could exploit this to execute arbitrary code in kernel context, leading to full system compromise. The vulnerability is rated with a CVSS score (not provided but likely high).
The fix has been applied in the Linux kernel stable branches via commits [1], [2], and [3]. Users should update their kernels to the latest stable versions to mitigate this vulnerability. No workaround is available other than applying the patch.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
8297dbf87989ef858f004bc347a6d1e7402205dc00065a0491c28c1e1522c95b9b98c93b1a2610ecd9fd523d22f2f7176Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/1c28c1e1522c773a94e26950ffb145e88cd9834bnvd
- git.kernel.org/stable/c/23d22f2f71768034d6ef86168213843fc49bf550nvd
- git.kernel.org/stable/c/297dbf87989e09af98f81f2bcb938041785557e8nvd
- git.kernel.org/stable/c/5dc00065a0496c36694afe11e52a5bc64524a9b8nvd
- git.kernel.org/stable/c/7a6d1e740220ff9dfcb6a8c994d6ba49e76db198nvd
- git.kernel.org/stable/c/95b9b98c93b1c0916a3d4cf4540b7f5d69145a0dnvd
- git.kernel.org/stable/c/a2610ecd9fd5708be8997ca8f033e4200c0bb6afnvd
- git.kernel.org/stable/c/f858f004bc343a7ae9f2533bbb2a3ab27428532fnvd
News mentions
0No linked articles in our index yet.