Impact
The Linux kernel Bluetooth module contains a type confusion bug in the function that processes L2CAP ECRED reconfiguration responses. The code mistakenly interprets the incoming packet as a larger connection‑response structure, causing a size check to reject valid short packets and misread the result field from an incorrect offset. This leads to legitimate frames being dropped or incorrect data being stored, which can disrupt Bluetooth connectivity and potentially allow a malicious actor to induce packet loss or incorrect state handling. The weakness falls under CWE‑754: Use of Object of Incorrect Type; the issue does not provide for arbitrary code execution but can degrade service reliability.
Affected Systems
The vulnerability affects all Linux kernel builds that contain the Linux kernel Bluetooth L2CAP implementation before the applied patch. The Common Platform Enumeration entry identifies the entire Linux kernel family, and there is no finer‑grained version list in the data. Administrators should check that the kernel they run is at or beyond the commit that fixes the bug or verify that the patch is applied manually.
Risk and Exploitability
No CVSS score is provided, and the EPSS score is unavailable, but the vulnerability is known to exist in production kernels. The most likely attack vector is through the Bluetooth interface, where an attacker capable of transmitting crafted L2CAP_RECONF_RSP packets could induce packet rejection or incorrect handling. Attacker sophistication is moderate: a Bluetooth stack is required but no privileged code execution is needed. Because the bug affects only the handling of a specific control packet, the overall exploitation risk is considered moderate; however, the impact on service availability can be significant if an attacker floods the target with malformed frames.
OpenCVE Enrichment