Impact
This vulnerability arises within the Linux kernel Bluetooth stack, specifically the hci_ll module's firmware download routine. When a firmware fetch succeeds but the firmware payload is empty or invalid, the routine exits without releasing the firmware resource, creating a memory/resource leak. This weakness (CWE‑791) can cause gradual exhaustion of kernel memory, potentially leading to system instability or a denial‑of‑service condition.
Affected Systems
The flaw affects any Linux kernel that implements the hci_ll component of the Bluetooth subsystem. All distributions that ship the stock kernel without the reported fix are potentially vulnerable. No specific kernel release series or versions are listed in the advisory, so any kernel lacking the recent patch qualifies.
Risk and Exploitability
The CVSS score is not provided, and the EPSS score is unavailable, so the quantitative exposure metrics are missing. The flaw is not included in the CISA KEV catalog. An attacker would need to trigger the firmware load path with an invalid firmware blob, which could be accomplished if an adversary controls a Bluetooth device or can inject firmware. While the primary impact is denial‑of‑service via resource exhaustion, the lack of a publicly available exploit means the immediate risk remains limited until the kernel is patched.
OpenCVE Enrichment