CVE-2025-38128
BaseFortify
Publication date: 2025-07-03
Last updated on: 2025-11-20
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's Bluetooth management involves improper validation of the size of parameters passed to the function mgmt_hci_cmd_sync(). If the size does not match the expected structure size plus any trailing bytes, a large invalid parameter length can cause the function hci_cmd_sync_alloc() to read data beyond the intended memory area, potentially leading to memory corruption or other unintended behavior.
How can this vulnerability impact me? :
The impact of this vulnerability could include memory corruption or unexpected behavior in the Bluetooth subsystem of the Linux kernel, which might be exploited to cause system instability, crashes, or potentially allow an attacker to execute arbitrary code or escalate privileges.