VYPR
Unrated severityNVD Advisory· Published Dec 6, 2025· Updated Apr 15, 2026

CVE-2025-40282

CVE-2025-40282

Description

In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: 6lowpan: reset link-local header on ipv6 recv path

Bluetooth 6lowpan.c netdev has header_ops, so it must set link-local header for RX skb, otherwise things crash, eg. with AF_PACKET SOCK_RAW

Add missing skb_reset_mac_header() for uncompressed ipv6 RX path.

For the compressed one, it is done in lowpan_header_decompress().

Log: (BlueZ 6lowpan-tester Client Recv Raw - Success) ------ kernel BUG at net/core/skbuff.c:212! Call Trace:

... packet_rcv (net/packet/af_packet.c:2152) ...

__local_bh_enable_ip (kernel/softirq.c:407) netif_rx (net/core/dev.c:5648) chan_recv_cb (net/bluetooth/6lowpan.c:294 net/bluetooth/6lowpan.c:359) ------

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing skb_reset_mac_header() in Bluetooth 6lowpan uncompressed IPv6 receive path causes kernel BUG on AF_PACKET raw socket recv.

Root

Cause

The Bluetooth 6lowpan netdev has header_ops defined, but the receive path for uncompressed IPv6 packets failed to call skb_reset_mac_header(). This omission causes a kernel BUG in packet_rcv() when an AF_PACKET raw socket receives the skb, as the link-layer header is not properly initialized [1][2][3][4].

Exploitation

An attacker with the ability to send Bluetooth 6lowpan packets over the air can trigger the bug. No authentication is required; simply sending a crafted uncompressed IPv6 packet to a device with the Bluetooth 6lowpan interface active leads to a crash. The issue manifests when a raw socket (SOCK_RAW) is listening on the interface, though the crash occurs regardless of socket creation.

Impact

Successful exploitation causes a kernel BUG, leading to a system denial of service (crash). This can be used to disrupt Bluetooth-enabled devices or as part of a broader attack chain.

Mitigation

The fix has been applied in stable kernel commits [1][2][3][4]. Users should update their Linux kernel to a version including these patches.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

3

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.