Impact
The flaw exists in the Linux kernel Bluetooth subsystem. When a Bluetooth device sends a L2CAP_INFO_RSP packet, the kernel function l2cap_information_rsp checks only the fixed header portion of the packet but then reads beyond the header without verifying that the reported payload length is sufficient. This out‑of‑bounds read can expose adjacent kernel memory. The vulnerability does not provide code execution but can leak sensitive data, making it a high‑severity flaw with a CVSS score of 8.1.
Affected Systems
All Linux kernel releases prior to the application of the patch commit 3b646516cba2ebc4b51a72954903326e7c1e443f or the equivalent patch set are affected. The issue was discovered in the Linux:Linux vendor ecosystem, affecting the generic Linux kernel image. No specific downstream versions are listed, so any distribution kernel that has not yet applied the patch may remain vulnerable.
Risk and Exploitability
The exploitable payload requires an attacker with access to the Bluetooth interface to send a crafted L2CAP_INFO_RSP message. The exploit vector is likely remote over a Bluetooth channel, but local exploitation is also conceivable if the attacker can trigger the condition. The EPSS score of less than 1% and its absence from the CISA KEV catalog suggest a low current likelihood of exploitation, yet the impact warrants remediation. An attacker would gain information leakage rather than full control.
OpenCVE Enrichment