{"id":"CVE-2025-40282","summary":"Bluetooth: 6lowpan: reset link-local header on ipv6 recv path","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: 6lowpan: reset link-local header on ipv6 recv path\n\nBluetooth 6lowpan.c netdev has header_ops, so it must set link-local\nheader for RX skb, otherwise things crash, eg. with AF_PACKET SOCK_RAW\n\nAdd missing skb_reset_mac_header() for uncompressed ipv6 RX path.\n\nFor the compressed one, it is done in lowpan_header_decompress().\n\nLog: (BlueZ 6lowpan-tester Client Recv Raw - Success)\n------\nkernel BUG at net/core/skbuff.c:212!\nCall Trace:\n\u003cIRQ\u003e\n...\npacket_rcv (net/packet/af_packet.c:2152)\n...\n\u003cTASK\u003e\n__local_bh_enable_ip (kernel/softirq.c:407)\nnetif_rx (net/core/dev.c:5648)\nchan_recv_cb (net/bluetooth/6lowpan.c:294 net/bluetooth/6lowpan.c:359)\n------","modified":"2026-04-02T12:48:21.432279Z","published":"2025-12-06T21:51:06.287Z","related":["MGASA-2026-0017","MGASA-2026-0018","SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0293-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:20207-1","SUSE-SU-2026:20220-1","SUSE-SU-2026:20228-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","openSUSE-SU-2026:20145-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40282.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/11cd7e068381666f842ad41d1cc58eecd0c75237"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3b78f50918276ab28fb22eac9aa49401ac436a3b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4ebb90c3c309e6375dc3e841af92e2a039843e62"},{"type":"WEB","url":"https://git.kernel.org/stable/c/70d84e7c3a44b81020a3c3d650a64c63593405bd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/973e0271754c77db3e1b6b69adf2de85a79a4c8b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c24ac6cfe4f9a47180a65592c47e7a310d2f9d93"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d566e9a2bfc848941b091ffd5f4e12c4e889d818"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ea46a1d217bc82e01cf3d0424e50ebfe251e34bf"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40282.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-40282"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"18722c247023035b9e2e2a08a887adec2a9a6e49"},{"fixed":"ea46a1d217bc82e01cf3d0424e50ebfe251e34bf"},{"fixed":"973e0271754c77db3e1b6b69adf2de85a79a4c8b"},{"fixed":"d566e9a2bfc848941b091ffd5f4e12c4e889d818"},{"fixed":"4ebb90c3c309e6375dc3e841af92e2a039843e62"},{"fixed":"c24ac6cfe4f9a47180a65592c47e7a310d2f9d93"},{"fixed":"11cd7e068381666f842ad41d1cc58eecd0c75237"},{"fixed":"70d84e7c3a44b81020a3c3d650a64c63593405bd"},{"fixed":"3b78f50918276ab28fb22eac9aa49401ac436a3b"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-40282.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"3.14.0"},{"fixed":"5.4.302"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.247"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.197"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.159"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.117"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.59"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.9"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-40282.json"}}],"schema_version":"1.7.5"}