CVE-2025-40301
Bluetooth: hci_event: validate skb length for unknown CC opcode
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: validate skb length for unknown CC opcode In hci_cmd_complete_evt(), if the command complete event has an unknown opcode, we assume the first byte of the remaining skb->data contains the return status. However, parameter data has previously been pulled in hci_event_func(), which may leave the skb empty. If so, using skb->data[0] for the return status uses un-init memory. The fix is to check skb->len before using skb->data.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Dec 8, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
afcb3369f46ed5dc883a7b92f2dd1e264d79d388 < fea895de78d3bb2f0c09db9f10b18f8121b15759 afcb3369f46ed5dc883a7b92f2dd1e264d79d388 < 779f83a91d4f1bf5ddfeaf528420cbb6dbf03fa8 afcb3369f46ed5dc883a7b92f2dd1e264d79d388 < cf2c2acec1cf456c3d11c11a7589e886a0f963a9 afcb3369f46ed5dc883a7b92f2dd1e264d79d388 < 1a0ddaaf97405dbd11d4cb5a961a3f82400e8a50 afcb3369f46ed5dc883a7b92f2dd1e264d79d388 < 5c5f1f64681cc889d9b13e4a61285e9e029d6ab5
Linux / Linux
6.1
References
git.kernel.org: https://git.kernel.org/stable/c/fea895de78d3bb2f0c09db9f10b18f8121b15759 git.kernel.org: https://git.kernel.org/stable/c/779f83a91d4f1bf5ddfeaf528420cbb6dbf03fa8 git.kernel.org: https://git.kernel.org/stable/c/cf2c2acec1cf456c3d11c11a7589e886a0f963a9 git.kernel.org: https://git.kernel.org/stable/c/1a0ddaaf97405dbd11d4cb5a961a3f82400e8a50 git.kernel.org: https://git.kernel.org/stable/c/5c5f1f64681cc889d9b13e4a61285e9e029d6ab5