Impact
A malformed Enhanced Credit Based Connection Request can cause the Linux kernel Bluetooth L2CAP stack to read past a 18‑byte stack buffer. The resulting out‑of‑bounds read triggers a KASAN panic, causing the kernel to crash. While this does not provide code execution, it can bring the system down entirely, leading to a denial of service.
Affected Systems
The vulnerability affects the Linux kernel’s Bluetooth L2CAP implementation. All kernel releases containing the original l2cap_ecred_conn_req code are potentially impacted until the patch that moves rsp_len assignment past the boundary check is deployed.
Risk and Exploitability
The exploit requires an attacker to send a specially crafted Bluetooth packet that requests more than five Source Channel IDs. The attack vector is inferred to be over the Bluetooth interface, allowing remote or local actors to trigger the crash. No official KEV listing or EPSS score is available, and no CVSS score is provided in the data. Nevertheless, the vulnerability can be triggered by remote devices in proximity, potentially making it feasible for attackers to cause service disruption on affected hosts.
OpenCVE Enrichment