-

CVE-2025-40308

In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: bcsp: receive data only if registered

Currently, bcsp_recv() can be called even when the BCSP protocol has not
been registered. This leads to a NULL pointer dereference, as shown in
the following stack trace:

    KASAN: null-ptr-deref in range [0x0000000000000108-0x000000000000010f]
    RIP: 0010:bcsp_recv+0x13d/0x1740 drivers/bluetooth/hci_bcsp.c:590
    Call Trace:
     <TASK>
     hci_uart_tty_receive+0x194/0x220 drivers/bluetooth/hci_ldisc.c:627
     tiocsti+0x23c/0x2c0 drivers/tty/tty_io.c:2290
     tty_ioctl+0x626/0xde0 drivers/tty/tty_io.c:2706
     vfs_ioctl fs/ioctl.c:51 [inline]
     __do_sys_ioctl fs/ioctl.c:907 [inline]
     __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893
     do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
     do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
     entry_SYSCALL_64_after_hwframe+0x77/0x7f

To prevent this, ensure that the HCI_UART_REGISTERED flag is set before
processing received data. If the protocol is not registered, return
-EUNATCH.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 39a7d40314b6288cfa2d13269275e9247a7a055a
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 164586725b47f9d61912e6bf17dbaffeff11710b
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < b65ca9708bfbf47d8b7bd44b7c574bd16798e9c9
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 8b892dbef3887dbe9afdc7176d1a5fd90e1636aa
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 799cd62cbcc3f12ee04b33ef390ff7d41c37d671
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < b420a4c7f915fc1c94ad1f6ca740acc046d94334
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 55c1519fca830f59a10bbf9aa8209c87b06cf7bc
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < ca94b2b036c22556c3a66f1b80f490882deef7a6
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version <= 5.4.*
Version 5.4.302
Status unaffected
Version <= 5.10.*
Version 5.10.247
Status unaffected
Version <= 5.15.*
Version 5.15.197
Status unaffected
Version <= 6.1.*
Version 6.1.159
Status unaffected
Version <= 6.6.*
Version 6.6.117
Status unaffected
Version <= 6.12.*
Version 6.12.58
Status unaffected
Version <= 6.17.*
Version 6.17.8
Status unaffected
Version <= *
Version 6.18
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.088
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String