CVE-2025-38315

5.5 MEDIUM

📋 TL;DR

A stack buffer overflow vulnerability in the Linux kernel's Bluetooth Intel driver allows attackers to execute arbitrary code or cause denial of service. The vulnerability occurs when the driver incorrectly handles EFI variable data larger than expected. Systems running affected Linux kernel versions with Bluetooth hardware are at risk.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not specified in CVE, but patches exist in stable kernel trees.
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Bluetooth hardware and Intel Bluetooth firmware. Systems without Bluetooth or with Bluetooth disabled are not vulnerable.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to kernel-level code execution, potentially leading to full system compromise.

🟠

Likely Case

System crash or denial of service affecting Bluetooth functionality.

🟢

If Mitigated

Limited impact if Bluetooth is disabled or system has proper kernel protections.

🌐 Internet-Facing: LOW - Requires local access or Bluetooth proximity.
🏢 Internal Only: MEDIUM - Local attackers could exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to modify EFI variables or trigger the vulnerable code path.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available in stable kernel trees (commits: 3aa1dc3c9060e335e82e9c182bf3d1db29220b1b, 7b8526bb489780ccc0caffc446ecabec83cfe568, 9427f6081f37c795a8bd29d0ee72a4da3bd64af8)

Vendor Advisory: https://git.kernel.org/stable/c/3aa1dc3c9060e335e82e9c182bf3d1db29220b1b

Restart Required: Yes

Instructions:

1. Update to latest stable Linux kernel version containing the fix. 2. Reboot system to load new kernel. 3. Verify Bluetooth functionality remains operational.

🔧 Temporary Workarounds

Disable Bluetooth

linux

Temporarily disable Bluetooth functionality to prevent exploitation.

sudo systemctl stop bluetooth
sudo systemctl disable bluetooth
sudo rfkill block bluetooth

Remove Bluetooth kernel module

linux

Unload the vulnerable Bluetooth driver module.

sudo modprobe -r btintel
sudo modprobe -r bluetooth

🧯 If You Can't Patch

  • Disable Bluetooth hardware in BIOS/UEFI settings
  • Implement strict access controls to prevent local privilege escalation

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if Bluetooth Intel module is loaded: lsmod | grep btintel

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated and check dmesg for Bluetooth initialization without errors

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic or oops messages related to Bluetooth
  • System crashes when Bluetooth is enabled
  • EFI variable access errors in kernel logs

Network Indicators:

  • Unusual Bluetooth connection attempts
  • Bluetooth service crashes

SIEM Query:

source="kernel" AND ("btintel" OR "Bluetooth") AND ("panic" OR "oops" OR "segfault")

🔗 References

📤 Share & Export