U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2026-43069 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_ll: Fix firmware leak on error path Smatch reports: drivers/bluetooth/hci_ll.c:587 download_firmware() warn: 'fw' from request_firmware() not released on lines: 544. In download_firmware(), if request_firmware() succeeds but the returned firmware content is invalid (no data or zero size), the function returns without releasing the firmware, resulting in a resource leak. Fix this by calling release_firmware() before returning when request_firmware() succeeded but the firmware content is invalid.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/28904375d54b436a757641fb0331537778c0de5a kernel.org
https://git.kernel.org/stable/c/31148a7be723aa9f2e8fbd62424825ab8d577973 kernel.org
https://git.kernel.org/stable/c/5213ef54528dd1ac79b846e30d8f72ce092794aa kernel.org
https://git.kernel.org/stable/c/95e8601af227b2b4390eecf8db6abdb9f6a91f17 kernel.org
https://git.kernel.org/stable/c/9ecbfd93cd6de6c78cb7fd51fe079e36c7ff074b kernel.org
https://git.kernel.org/stable/c/a7803df606a7d22e896b030f619e1d9d20ae0c6b kernel.org
https://git.kernel.org/stable/c/b2dfbf1b5ff192cefd49574b951a4af9ddd32213 kernel.org
https://git.kernel.org/stable/c/e6d95488c8c964d1df0d3e1db44c958706311e86 kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2026-43069
NVD Published Date:
05/05/2026
NVD Last Modified:
05/06/2026
Source:
kernel.org