Description
In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_ll: Fix firmware leak on error path

Smatch reports:

drivers/bluetooth/hci_ll.c:587 download_firmware() warn:
'fw' from request_firmware() not released on lines: 544.

In download_firmware(), if request_firmware() succeeds but the returned
firmware content is invalid (no data or zero size), the function returns
without releasing the firmware, resulting in a resource leak.

Fix this by calling release_firmware() before returning when
request_firmware() succeeded but the firmware content is invalid.
Published: 2026-05-05
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability arises within the Linux kernel Bluetooth stack, specifically the hci_ll module's firmware download routine. When a firmware fetch succeeds but the firmware payload is empty or invalid, the routine exits without releasing the firmware resource, creating a memory/resource leak. This weakness (CWE‑791) can cause gradual exhaustion of kernel memory, potentially leading to system instability or a denial‑of‑service condition.

Affected Systems

The flaw affects any Linux kernel that implements the hci_ll component of the Bluetooth subsystem. All distributions that ship the stock kernel without the reported fix are potentially vulnerable. No specific kernel release series or versions are listed in the advisory, so any kernel lacking the recent patch qualifies.

Risk and Exploitability

The CVSS score is not provided, and the EPSS score is unavailable, so the quantitative exposure metrics are missing. The flaw is not included in the CISA KEV catalog. An attacker would need to trigger the firmware load path with an invalid firmware blob, which could be accomplished if an adversary controls a Bluetooth device or can inject firmware. While the primary impact is denial‑of‑service via resource exhaustion, the lack of a publicly available exploit means the immediate risk remains limited until the kernel is patched.

Generated by OpenCVE AI on May 5, 2026 at 17:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a Linux kernel that incorporates the hci_ll firmware leak fix (patches included in recent stable releases).
  • If an immediate kernel update is not possible, consider disabling Bluetooth firmware loading or limiting the use of untrusted Bluetooth devices.
  • Monitor kernel logs for repeated firmware load failures or memory allocation warnings that might indicate the leak; apply a patch as soon as one becomes available.

Generated by OpenCVE AI on May 5, 2026 at 17:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 05 May 2026 17:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-791

Tue, 05 May 2026 16:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_ll: Fix firmware leak on error path Smatch reports: drivers/bluetooth/hci_ll.c:587 download_firmware() warn: 'fw' from request_firmware() not released on lines: 544. In download_firmware(), if request_firmware() succeeds but the returned firmware content is invalid (no data or zero size), the function returns without releasing the firmware, resulting in a resource leak. Fix this by calling release_firmware() before returning when request_firmware() succeeded but the firmware content is invalid.
Title Bluetooth: hci_ll: Fix firmware leak on error path
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-05T15:23:28.120Z

Reserved: 2026-05-01T14:12:55.982Z

Link: CVE-2026-43069

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-05T16:16:16.197

Modified: 2026-05-05T16:16:16.197

Link: CVE-2026-43069

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-05T18:00:12Z

Weaknesses