Логотип exploitDog
bind:CVE-2025-40301
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-40301

Количество 6

Количество 6

ubuntu логотип

CVE-2025-40301

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: validate skb length for unknown CC opcode In hci_cmd_complete_evt(), if the command complete event has an unknown opcode, we assume the first byte of the remaining skb->data contains the return status. However, parameter data has previously been pulled in hci_event_func(), which may leave the skb empty. If so, using skb->data[0] for the return status uses un-init memory. The fix is to check skb->len before using skb->data.

EPSS: Низкий
nvd логотип

CVE-2025-40301

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: validate skb length for unknown CC opcode In hci_cmd_complete_evt(), if the command complete event has an unknown opcode, we assume the first byte of the remaining skb->data contains the return status. However, parameter data has previously been pulled in hci_event_func(), which may leave the skb empty. If so, using skb->data[0] for the return status uses un-init memory. The fix is to check skb->len before using skb->data.

EPSS: Низкий
msrc логотип

CVE-2025-40301

около 2 месяцев назад

Bluetooth: hci_event: validate skb length for unknown CC opcode

CVSS3: 7.1
EPSS: Низкий
debian логотип

CVE-2025-40301

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: B ...

EPSS: Низкий
github логотип

GHSA-mp66-rx49-f278

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: validate skb length for unknown CC opcode In hci_cmd_complete_evt(), if the command complete event has an unknown opcode, we assume the first byte of the remaining skb->data contains the return status. However, parameter data has previously been pulled in hci_event_func(), which may leave the skb empty. If so, using skb->data[0] for the return status uses un-init memory. The fix is to check skb->len before using skb->data.

EPSS: Низкий
oracle-oval логотип

ELSA-2026-50006

23 дня назад

ELSA-2026-50006: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-40301

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: validate skb length for unknown CC opcode In hci_cmd_complete_evt(), if the command complete event has an unknown opcode, we assume the first byte of the remaining skb->data contains the return status. However, parameter data has previously been pulled in hci_event_func(), which may leave the skb empty. If so, using skb->data[0] for the return status uses un-init memory. The fix is to check skb->len before using skb->data.

0%
Низкий
около 2 месяцев назад
nvd логотип
CVE-2025-40301

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: validate skb length for unknown CC opcode In hci_cmd_complete_evt(), if the command complete event has an unknown opcode, we assume the first byte of the remaining skb->data contains the return status. However, parameter data has previously been pulled in hci_event_func(), which may leave the skb empty. If so, using skb->data[0] for the return status uses un-init memory. The fix is to check skb->len before using skb->data.

0%
Низкий
около 2 месяцев назад
msrc логотип
CVE-2025-40301

Bluetooth: hci_event: validate skb length for unknown CC opcode

CVSS3: 7.1
0%
Низкий
около 2 месяцев назад
debian логотип
CVE-2025-40301

In the Linux kernel, the following vulnerability has been resolved: B ...

0%
Низкий
около 2 месяцев назад
github логотип
GHSA-mp66-rx49-f278

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: validate skb length for unknown CC opcode In hci_cmd_complete_evt(), if the command complete event has an unknown opcode, we assume the first byte of the remaining skb->data contains the return status. However, parameter data has previously been pulled in hci_event_func(), which may leave the skb empty. If so, using skb->data[0] for the return status uses un-init memory. The fix is to check skb->len before using skb->data.

0%
Низкий
около 2 месяцев назад
oracle-oval логотип
ELSA-2026-50006

ELSA-2026-50006: Unbreakable Enterprise kernel security update (IMPORTANT)

23 дня назад

Уязвимостей на страницу