Impact
In the Linux kernel Bluetooth stack, a short HCI event packet can be processed by hci_store_wake_reason() before the per-event minimum payload length is verified, allowing the bacpy() function to operate on unvalidated data. This missing buffer bounds check can lead to memory corruption, potentially allowing an attacker to trigger a crash or influence kernel state during Bluetooth communication.
Affected Systems
The flaw exists in all Linux kernel builds that include the legacy Bluetooth HCI event handling code. The affected components are the generic Linux kernel and its Bluetooth driver modules. No specific vendor or version information is listed beyond the Linux kernel itself, so any distribution that has not yet applied the recent patch revision is considered vulnerable.
Risk and Exploitability
The CVSS score is 7.0, and EPSS is unavailable; however, because the vulnerability requires the delivery of crafted HCI event packets, it is best‑effort remote via Bluetooth. If an attacker can inject such packets, the memory corruption may lead to a denial‑of‑service condition or, in the worst case, elevate privileges. The vulnerability is not listed in the CISA KEV catalog, suggesting no widespread exploitation has been observed yet, but the lack of bounds checking inherently increases the risk of destabilization of the kernel.
OpenCVE Enrichment