CVE-2025-40308
BaseFortify
Publication date: 2025-12-08
Last updated on: 2025-12-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's Bluetooth subsystem, specifically in the bcsp_recv() function. The function can be called even when the BCSP protocol has not been registered, leading to a NULL pointer dereference. This means the system tries to access memory through a pointer that has not been properly initialized, causing a crash or instability. The issue arises because the code does not check if the protocol is registered before processing received data.
How can this vulnerability impact me? :
The vulnerability can cause a NULL pointer dereference in the Linux kernel Bluetooth driver, which may lead to system crashes or instability. This can disrupt Bluetooth functionality and potentially affect the overall reliability of the system running the vulnerable kernel.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves a NULL pointer dereference in the Linux kernel Bluetooth bcsp_recv() function when the BCSP protocol is not registered. Detection would involve monitoring kernel logs for KASAN null pointer dereference messages related to bcsp_recv or Bluetooth bcsp. You can check kernel logs using commands like 'dmesg | grep bcsp' or 'journalctl -k | grep bcsp' to look for related error messages or crashes. Additionally, monitoring for Bluetooth subsystem crashes or unusual behavior may help detect exploitation attempts.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that the HCI_UART_REGISTERED flag is set before processing received Bluetooth data via the BCSP protocol. If the protocol is not registered, the system should return -EUNATCH to prevent the NULL pointer dereference. Practically, this means applying the relevant Linux kernel patch that fixes this issue or upgrading to a kernel version where this vulnerability is resolved.