Логотип exploitDog
bind:"GHSA-23g6-rffg-7f3p" OR bind:"CVE-2025-40294"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-23g6-rffg-7f3p" OR bind:"CVE-2025-40294"

Количество 16

Количество 16

github логотип

GHSA-23g6-rffg-7f3p

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern() In the parse_adv_monitor_pattern() function, the value of the 'length' variable is currently limited to HCI_MAX_EXT_AD_LENGTH(251). The size of the 'value' array in the mgmt_adv_pattern structure is 31. If the value of 'pattern[i].length' is set in the user space and exceeds 31, the 'patterns[i].value' array can be accessed out of bound when copied. Increasing the size of the 'value' array in the 'mgmt_adv_pattern' structure will break the userspace. Considering this, and to avoid OOB access revert the limits for 'offset' and 'length' back to the value of HCI_MAX_AD_LENGTH. Found by InfoTeCS on behalf of Linux Verification Center (linuxtesting.org) with SVACE.

EPSS: Низкий
ubuntu логотип

CVE-2025-40294

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern() In the parse_adv_monitor_pattern() function, the value of the 'length' variable is currently limited to HCI_MAX_EXT_AD_LENGTH(251). The size of the 'value' array in the mgmt_adv_pattern structure is 31. If the value of 'pattern[i].length' is set in the user space and exceeds 31, the 'patterns[i].value' array can be accessed out of bound when copied. Increasing the size of the 'value' array in the 'mgmt_adv_pattern' structure will break the userspace. Considering this, and to avoid OOB access revert the limits for 'offset' and 'length' back to the value of HCI_MAX_AD_LENGTH. Found by InfoTeCS on behalf of Linux Verification Center (linuxtesting.org) with SVACE.

EPSS: Низкий
redhat логотип

CVE-2025-40294

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern() In the parse_adv_monitor_pattern() function, the value of the 'length' variable is currently limited to HCI_MAX_EXT_AD_LENGTH(251). The size of the 'value' array in the mgmt_adv_pattern structure is 31. If the value of 'pattern[i].length' is set in the user space and exceeds 31, the 'patterns[i].value' array can be accessed out of bound when copied. Increasing the size of the 'value' array in the 'mgmt_adv_pattern' structure will break the userspace. Considering this, and to avoid OOB access revert the limits for 'offset' and 'length' back to the value of HCI_MAX_AD_LENGTH. Found by InfoTeCS on behalf of Linux Verification Center (linuxtesting.org) with SVACE.

CVSS3: 7.3
EPSS: Низкий
nvd логотип

CVE-2025-40294

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern() In the parse_adv_monitor_pattern() function, the value of the 'length' variable is currently limited to HCI_MAX_EXT_AD_LENGTH(251). The size of the 'value' array in the mgmt_adv_pattern structure is 31. If the value of 'pattern[i].length' is set in the user space and exceeds 31, the 'patterns[i].value' array can be accessed out of bound when copied. Increasing the size of the 'value' array in the 'mgmt_adv_pattern' structure will break the userspace. Considering this, and to avoid OOB access revert the limits for 'offset' and 'length' back to the value of HCI_MAX_AD_LENGTH. Found by InfoTeCS on behalf of Linux Verification Center (linuxtesting.org) with SVACE.

EPSS: Низкий
msrc логотип

CVE-2025-40294

4 месяца назад

Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern()

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2025-40294

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: B ...

EPSS: Низкий
fstec логотип

BDU:2026-02836

4 месяца назад

Уязвимость модуля Bluetooth ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность данных

CVSS3: 4.4
EPSS: Низкий
rocky логотип

RLSA-2026:1143

около 2 месяцев назад

Important: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1143

около 2 месяцев назад

ELSA-2026-1143: kernel security update (IMPORTANT)

EPSS: Низкий
rocky логотип

RLSA-2026:1690

около 2 месяцев назад

Important: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1690

около 2 месяцев назад

ELSA-2026-1690: kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-50006

2 месяца назад

ELSA-2026-50006: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2026:20145-1

около 2 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0315-1

около 2 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0281-1

2 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0278-1

2 месяца назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-23g6-rffg-7f3p

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern() In the parse_adv_monitor_pattern() function, the value of the 'length' variable is currently limited to HCI_MAX_EXT_AD_LENGTH(251). The size of the 'value' array in the mgmt_adv_pattern structure is 31. If the value of 'pattern[i].length' is set in the user space and exceeds 31, the 'patterns[i].value' array can be accessed out of bound when copied. Increasing the size of the 'value' array in the 'mgmt_adv_pattern' structure will break the userspace. Considering this, and to avoid OOB access revert the limits for 'offset' and 'length' back to the value of HCI_MAX_AD_LENGTH. Found by InfoTeCS on behalf of Linux Verification Center (linuxtesting.org) with SVACE.

0%
Низкий
4 месяца назад
ubuntu логотип
CVE-2025-40294

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern() In the parse_adv_monitor_pattern() function, the value of the 'length' variable is currently limited to HCI_MAX_EXT_AD_LENGTH(251). The size of the 'value' array in the mgmt_adv_pattern structure is 31. If the value of 'pattern[i].length' is set in the user space and exceeds 31, the 'patterns[i].value' array can be accessed out of bound when copied. Increasing the size of the 'value' array in the 'mgmt_adv_pattern' structure will break the userspace. Considering this, and to avoid OOB access revert the limits for 'offset' and 'length' back to the value of HCI_MAX_AD_LENGTH. Found by InfoTeCS on behalf of Linux Verification Center (linuxtesting.org) with SVACE.

0%
Низкий
4 месяца назад
redhat логотип
CVE-2025-40294

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern() In the parse_adv_monitor_pattern() function, the value of the 'length' variable is currently limited to HCI_MAX_EXT_AD_LENGTH(251). The size of the 'value' array in the mgmt_adv_pattern structure is 31. If the value of 'pattern[i].length' is set in the user space and exceeds 31, the 'patterns[i].value' array can be accessed out of bound when copied. Increasing the size of the 'value' array in the 'mgmt_adv_pattern' structure will break the userspace. Considering this, and to avoid OOB access revert the limits for 'offset' and 'length' back to the value of HCI_MAX_AD_LENGTH. Found by InfoTeCS on behalf of Linux Verification Center (linuxtesting.org) with SVACE.

CVSS3: 7.3
0%
Низкий
4 месяца назад
nvd логотип
CVE-2025-40294

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern() In the parse_adv_monitor_pattern() function, the value of the 'length' variable is currently limited to HCI_MAX_EXT_AD_LENGTH(251). The size of the 'value' array in the mgmt_adv_pattern structure is 31. If the value of 'pattern[i].length' is set in the user space and exceeds 31, the 'patterns[i].value' array can be accessed out of bound when copied. Increasing the size of the 'value' array in the 'mgmt_adv_pattern' structure will break the userspace. Considering this, and to avoid OOB access revert the limits for 'offset' and 'length' back to the value of HCI_MAX_AD_LENGTH. Found by InfoTeCS on behalf of Linux Verification Center (linuxtesting.org) with SVACE.

0%
Низкий
4 месяца назад
msrc логотип
CVE-2025-40294

Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern()

CVSS3: 5.5
0%
Низкий
4 месяца назад
debian логотип
CVE-2025-40294

In the Linux kernel, the following vulnerability has been resolved: B ...

0%
Низкий
4 месяца назад
fstec логотип
BDU:2026-02836

Уязвимость модуля Bluetooth ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность данных

CVSS3: 4.4
0%
Низкий
4 месяца назад
rocky логотип
RLSA-2026:1143

Important: kernel security update

около 2 месяцев назад
oracle-oval логотип
ELSA-2026-1143

ELSA-2026-1143: kernel security update (IMPORTANT)

около 2 месяцев назад
rocky логотип
RLSA-2026:1690

Important: kernel security update

около 2 месяцев назад
oracle-oval логотип
ELSA-2026-1690

ELSA-2026-1690: kernel security update (IMPORTANT)

около 2 месяцев назад
oracle-oval логотип
ELSA-2026-50006

ELSA-2026-50006: Unbreakable Enterprise kernel security update (IMPORTANT)

2 месяца назад
suse-cvrf логотип
openSUSE-SU-2026:20145-1

Security update for the Linux Kernel

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0315-1

Security update for the Linux Kernel

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0281-1

Security update for the Linux Kernel

2 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0278-1

Security update for the Linux Kernel

2 месяца назад

Уязвимостей на страницу