CVE-2025-40301
BaseFortify
Publication date: 2025-12-08
Last updated on: 2025-12-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's Bluetooth subsystem occurs in the handling of command complete events with unknown opcodes. Specifically, the code assumes that the first byte of the remaining skb->data contains the return status. However, because parameter data may have already been pulled earlier, the skb could be empty, leading to the use of uninitialized memory when accessing skb->data[0]. The fix involves checking the length of skb before accessing its data to prevent this issue.
How can this vulnerability impact me? :
The vulnerability can lead to the use of uninitialized memory when processing Bluetooth command complete events with unknown opcodes. This could potentially cause unpredictable behavior, crashes, or security issues such as information leakage or system instability in affected Linux systems.