CVE-2026-31771
Buffer Overflow in Linux Kernel Bluetooth Event Handling
Publication date: 2026-05-01
Last updated on: 2026-05-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's Bluetooth subsystem, specifically in the handling of HCI (Host Controller Interface) event packets. The function hci_store_wake_reason() is called too early, before proper validation of the event payload length occurs. This allows a short or malformed HCI event frame to reach the bacpy() function without bounds checking, potentially leading to memory corruption or other unexpected behavior.
The fix involved moving the storage of the wake reason into individual validated event handlers after their length checks have succeeded, ensuring that only validated data is processed. Additionally, locking mechanisms were added to enforce proper synchronization.
How can this vulnerability impact me? :
This vulnerability could allow an attacker to exploit the improper handling of Bluetooth HCI event packets to cause memory corruption or unexpected behavior in the Linux kernel. This might lead to system instability, crashes, or potentially allow escalation of privileges or execution of arbitrary code within the kernel context.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved in the Linux kernel by moving wake reason storage into validated event handlers and enforcing proper bounds checks before processing HCI event frames.
To mitigate this vulnerability immediately, you should update your Linux kernel to a version that includes this fix.