Bluetooth: MGMT: validate LTK enc_size on load
Summary
| CVE | CVE-2026-43020 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-01 15:16:46 UTC |
| Updated | 2026-05-08 14:41:09 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: validate LTK enc_size on load Load Long Term Keys stores the user-provided enc_size and later uses it to size fixed-size stack operations when replying to LE LTK requests. An enc_size larger than the 16-byte key buffer can therefore overflow the reply stack buffer. Reject oversized enc_size values while validating the management LTK record so invalid keys never reach the stored key state. |
Risk And Classification
Primary CVSS: v3.1 7.8 HIGH from [email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS: 0.000240000 probability, percentile 0.068060000 (date 2026-05-05)
Problem Types: CWE-787
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Linux | Linux Kernel | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected 346af67b8d116f01ef696fd47959a55deb2db8b6 0f37d1e65c6d71ad94ccfb5c602163c525db789d git | Not specified |
| CNA | Linux | Linux | affected 346af67b8d116f01ef696fd47959a55deb2db8b6 257cdb960d8ff6d60bb6461b03c814b6cf0c9e64 git | Not specified |
| CNA | Linux | Linux | affected 346af67b8d116f01ef696fd47959a55deb2db8b6 c34577f517b556fb6ca173d45bf7e766ae2564ce git | Not specified |
| CNA | Linux | Linux | affected 346af67b8d116f01ef696fd47959a55deb2db8b6 f71695e81f4cb428f3c7e2138eae88199005b52c git | Not specified |
| CNA | Linux | Linux | affected 346af67b8d116f01ef696fd47959a55deb2db8b6 82f342b3b006ca1d65f4890c05f2ec32fcb808b6 git | Not specified |
| CNA | Linux | Linux | affected 346af67b8d116f01ef696fd47959a55deb2db8b6 50fb64defa72a3fecd0af1ca7c6b47b5c5c2b257 git | Not specified |
| CNA | Linux | Linux | affected 346af67b8d116f01ef696fd47959a55deb2db8b6 40ba329e8b4cd2fb11b0caf5e6a543ceaebb6009 git | Not specified |
| CNA | Linux | Linux | affected 346af67b8d116f01ef696fd47959a55deb2db8b6 b8dbe9648d69059cfe3a28917bfbf7e61efd7f15 git | Not specified |
| CNA | Linux | Linux | affected 3.4 | Not specified |
| CNA | Linux | Linux | unaffected 3.4 semver | Not specified |
| CNA | Linux | Linux | unaffected 5.10.253 5.10.* semver | Not specified |
| CNA | Linux | Linux | unaffected 5.15.203 5.15.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.168 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.134 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.81 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.22 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.12 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/40ba329e8b4cd2fb11b0caf5e6a543ceaebb6009 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/82f342b3b006ca1d65f4890c05f2ec32fcb808b6 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/c34577f517b556fb6ca173d45bf7e766ae2564ce | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/0f37d1e65c6d71ad94ccfb5c602163c525db789d | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/b8dbe9648d69059cfe3a28917bfbf7e61efd7f15 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/257cdb960d8ff6d60bb6461b03c814b6cf0c9e64 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/f71695e81f4cb428f3c7e2138eae88199005b52c | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/50fb64defa72a3fecd0af1ca7c6b47b5c5c2b257 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.