Bluetooth: L2CAP: Fix missing key size check for L2CAP_LE_CONN_REQ
Summary
| CVE | CVE-2026-43134 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-06 12:16:30 UTC |
| Updated | 2026-05-12 21:11:06 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix missing key size check for L2CAP_LE_CONN_REQ This adds a check for encryption key size upon receiving L2CAP_LE_CONN_REQ which is required by L2CAP/LE/CFC/BV-15-C which expects L2CAP_CR_LE_BAD_KEY_SIZE. |
Risk And Classification
Primary CVSS: v3.1 8.1 HIGH from 416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS: 0.000130000 probability, percentile 0.020280000 (date 2026-05-12)
Problem Types: NVD-CWE-noinfo
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Secondary | 8.1 | HIGH | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
| 3.1 | CNA | DECLARED | 8.1 | HIGH | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
CVSS v3.1 Breakdown
Attack Vector
AdjacentAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
NoneCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Linux | Linux Kernel | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected 27e2d4c8d28be1d1b4ecfbffab572d7dbd35254d 335071c0c3637064ec250481f589075db44fe4e6 git | Not specified |
| CNA | Linux | Linux | affected 27e2d4c8d28be1d1b4ecfbffab572d7dbd35254d fa6ad76fa8623c0a50d529cd5726fa5d819a3be4 git | Not specified |
| CNA | Linux | Linux | affected 27e2d4c8d28be1d1b4ecfbffab572d7dbd35254d 9118601ff90b79e8df3c0c98f48ae00c1b02ecef git | Not specified |
| CNA | Linux | Linux | affected 27e2d4c8d28be1d1b4ecfbffab572d7dbd35254d 481ea39b342c347b6ac029f3d418486280be4e45 git | Not specified |
| CNA | Linux | Linux | affected 27e2d4c8d28be1d1b4ecfbffab572d7dbd35254d ec91078e132179b04e0c3906b599816c056ceaad git | Not specified |
| CNA | Linux | Linux | affected 27e2d4c8d28be1d1b4ecfbffab572d7dbd35254d 96581749c7c14fbec32c35728520867929600041 git | Not specified |
| CNA | Linux | Linux | affected 27e2d4c8d28be1d1b4ecfbffab572d7dbd35254d 8dd43f9a9323f9c01bc8246da8d81a4c783c9e97 git | Not specified |
| CNA | Linux | Linux | affected 27e2d4c8d28be1d1b4ecfbffab572d7dbd35254d 138d7eca445ef37a0333425d269ee59900ca1104 git | Not specified |
| CNA | Linux | Linux | affected 3.14 | Not specified |
| CNA | Linux | Linux | unaffected 3.14 semver | Not specified |
| CNA | Linux | Linux | unaffected 5.10.252 5.10.* semver | Not specified |
| CNA | Linux | Linux | unaffected 5.15.202 5.15.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.165 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.128 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.75 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.16 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.6 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/9118601ff90b79e8df3c0c98f48ae00c1b02ecef | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/335071c0c3637064ec250481f589075db44fe4e6 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/138d7eca445ef37a0333425d269ee59900ca1104 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/481ea39b342c347b6ac029f3d418486280be4e45 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/ec91078e132179b04e0c3906b599816c056ceaad | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/fa6ad76fa8623c0a50d529cd5726fa5d819a3be4 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/96581749c7c14fbec32c35728520867929600041 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/8dd43f9a9323f9c01bc8246da8d81a4c783c9e97 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.