0.0
NA
CVE-2026-43069
Bluetooth: hci_ll: Fix firmware leak on error path
Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_ll: Fix firmware leak on error path Smatch reports: drivers/bluetooth/hci_ll.c:587 download_firmware() warn: 'fw' from request_firmware() not released on lines: 544. In download_firmware(), if request_firmware() succeeds but the returned firmware content is invalid (no data or zero size), the function returns without releasing the firmware, resulting in a resource leak. Fix this by calling release_firmware() before returning when request_firmware() succeeded but the firmware content is invalid.

INFO

Published Date :

May 5, 2026, 4:16 p.m.

Last Modified :

May 5, 2026, 4:16 p.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products

The following products are affected by CVE-2026-43069 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

No affected product recoded yet

Solution
Ensure firmware is released to prevent resource leaks on error paths.
  • Apply the patch to fix the firmware release logic.
  • Review firmware handling for potential resource leaks.
  • Update the Linux kernel to the patched version.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2026-43069 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2026-43069 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2026-43069 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2026-43069 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    May. 05, 2026

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_ll: Fix firmware leak on error path Smatch reports: drivers/bluetooth/hci_ll.c:587 download_firmware() warn: 'fw' from request_firmware() not released on lines: 544. In download_firmware(), if request_firmware() succeeds but the returned firmware content is invalid (no data or zero size), the function returns without releasing the firmware, resulting in a resource leak. Fix this by calling release_firmware() before returning when request_firmware() succeeded but the firmware content is invalid.
    Added Reference https://git.kernel.org/stable/c/28904375d54b436a757641fb0331537778c0de5a
    Added Reference https://git.kernel.org/stable/c/31148a7be723aa9f2e8fbd62424825ab8d577973
    Added Reference https://git.kernel.org/stable/c/5213ef54528dd1ac79b846e30d8f72ce092794aa
    Added Reference https://git.kernel.org/stable/c/95e8601af227b2b4390eecf8db6abdb9f6a91f17
    Added Reference https://git.kernel.org/stable/c/9ecbfd93cd6de6c78cb7fd51fe079e36c7ff074b
    Added Reference https://git.kernel.org/stable/c/a7803df606a7d22e896b030f619e1d9d20ae0c6b
    Added Reference https://git.kernel.org/stable/c/b2dfbf1b5ff192cefd49574b951a4af9ddd32213
    Added Reference https://git.kernel.org/stable/c/e6d95488c8c964d1df0d3e1db44c958706311e86
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.