Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-40301

Опубликовано: 08 дек. 2025
Источник: debian
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: validate skb length for unknown CC opcode In hci_cmd_complete_evt(), if the command complete event has an unknown opcode, we assume the first byte of the remaining skb->data contains the return status. However, parameter data has previously been pulled in hci_event_func(), which may leave the skb empty. If so, using skb->data[0] for the return status uses un-init memory. The fix is to check skb->len before using skb->data.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.17.8-1package
linuxfixed6.12.63-1trixiepackage
linuxfixed6.1.159-1bookwormpackage
linuxnot-affectedbullseyepackage

Примечания

  • https://git.kernel.org/linus/5c5f1f64681cc889d9b13e4a61285e9e029d6ab5 (6.18-rc5)

EPSS

Процентиль: 11%
0.00037
Низкий

Связанные уязвимости

ubuntu
около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: validate skb length for unknown CC opcode In hci_cmd_complete_evt(), if the command complete event has an unknown opcode, we assume the first byte of the remaining skb->data contains the return status. However, parameter data has previously been pulled in hci_event_func(), which may leave the skb empty. If so, using skb->data[0] for the return status uses un-init memory. The fix is to check skb->len before using skb->data.

nvd
около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: validate skb length for unknown CC opcode In hci_cmd_complete_evt(), if the command complete event has an unknown opcode, we assume the first byte of the remaining skb->data contains the return status. However, parameter data has previously been pulled in hci_event_func(), which may leave the skb empty. If so, using skb->data[0] for the return status uses un-init memory. The fix is to check skb->len before using skb->data.

CVSS3: 7.1
msrc
около 2 месяцев назад

Bluetooth: hci_event: validate skb length for unknown CC opcode

github
около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: validate skb length for unknown CC opcode In hci_cmd_complete_evt(), if the command complete event has an unknown opcode, we assume the first byte of the remaining skb->data contains the return status. However, parameter data has previously been pulled in hci_event_func(), which may leave the skb empty. If so, using skb->data[0] for the return status uses un-init memory. The fix is to check skb->len before using skb->data.

oracle-oval
23 дня назад

ELSA-2026-50006: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS

Процентиль: 11%
0.00037
Низкий