{"api_version":"1","generated_at":"2026-05-07T02:59:17+00:00","cve":"CVE-2026-43017","urls":{"html":"https://cve.report/CVE-2026-43017","api":"https://cve.report/api/cve/CVE-2026-43017.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-43017","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-43017"},"summary":{"title":"Bluetooth: MGMT: validate mesh send advertising payload length","description":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: MGMT: validate mesh send advertising payload length\n\nmesh_send() currently bounds MGMT_OP_MESH_SEND by total command\nlength, but it never verifies that the bytes supplied for the\nflexible adv_data[] array actually match the embedded adv_data_len\nfield. MGMT_MESH_SEND_SIZE only covers the fixed header, so a\ntruncated command can still pass the existing 20..50 byte range\ncheck and later drive the async mesh send path past the end of the\nqueued command buffer.\n\nKeep rejecting zero-length and oversized advertising payloads, but\nvalidate adv_data_len explicitly and require the command length to\nexactly match the flexible array size before queueing the request.","state":"PUBLISHED","assigner":"Linux","published_at":"2026-05-01 15:16:45","updated_at":"2026-05-01 15:24:14"},"problem_types":[],"metrics":[],"references":[{"url":"https://git.kernel.org/stable/c/0b706fb2294aff3adfd54653bda1b5e356ad4566","name":"https://git.kernel.org/stable/c/0b706fb2294aff3adfd54653bda1b5e356ad4566","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/562ed1954f0c1bff3422b7b752bd3dacf185edbf","name":"https://git.kernel.org/stable/c/562ed1954f0c1bff3422b7b752bd3dacf185edbf","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/244b639e6a3a8e26241e201004a3a9f764476631","name":"https://git.kernel.org/stable/c/244b639e6a3a8e26241e201004a3a9f764476631","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/bda93eec78cdbfe5cda00785cefebd443e56b88b","name":"https://git.kernel.org/stable/c/bda93eec78cdbfe5cda00785cefebd443e56b88b","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/24fa32369cf15d8fc918bdfe94097b12e6acada0","name":"https://git.kernel.org/stable/c/24fa32369cf15d8fc918bdfe94097b12e6acada0","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/edb5898cfa91afe7e8f83eda18d93034c953d632","name":"https://git.kernel.org/stable/c/edb5898cfa91afe7e8f83eda18d93034c953d632","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-43017","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-43017","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected b338d91703fae6f6afd67f3f75caa3b8f36ddef3 24fa32369cf15d8fc918bdfe94097b12e6acada0 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected b338d91703fae6f6afd67f3f75caa3b8f36ddef3 244b639e6a3a8e26241e201004a3a9f764476631 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected b338d91703fae6f6afd67f3f75caa3b8f36ddef3 0b706fb2294aff3adfd54653bda1b5e356ad4566 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected b338d91703fae6f6afd67f3f75caa3b8f36ddef3 edb5898cfa91afe7e8f83eda18d93034c953d632 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected b338d91703fae6f6afd67f3f75caa3b8f36ddef3 562ed1954f0c1bff3422b7b752bd3dacf185edbf git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected b338d91703fae6f6afd67f3f75caa3b8f36ddef3 bda93eec78cdbfe5cda00785cefebd443e56b88b git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 6.1","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.1 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.1.168 6.1.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.6.134 6.6.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.12.81 6.12.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.18.22 6.18.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.19.12 6.19.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 7.0 * original_commit_for_fix","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"43017","cve":"CVE-2026-43017","epss":"0.000240000","percentile":"0.068060000","score_date":"2026-05-05","updated_at":"2026-05-06 00:08:09"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["net/bluetooth/mgmt.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"24fa32369cf15d8fc918bdfe94097b12e6acada0","status":"affected","version":"b338d91703fae6f6afd67f3f75caa3b8f36ddef3","versionType":"git"},{"lessThan":"244b639e6a3a8e26241e201004a3a9f764476631","status":"affected","version":"b338d91703fae6f6afd67f3f75caa3b8f36ddef3","versionType":"git"},{"lessThan":"0b706fb2294aff3adfd54653bda1b5e356ad4566","status":"affected","version":"b338d91703fae6f6afd67f3f75caa3b8f36ddef3","versionType":"git"},{"lessThan":"edb5898cfa91afe7e8f83eda18d93034c953d632","status":"affected","version":"b338d91703fae6f6afd67f3f75caa3b8f36ddef3","versionType":"git"},{"lessThan":"562ed1954f0c1bff3422b7b752bd3dacf185edbf","status":"affected","version":"b338d91703fae6f6afd67f3f75caa3b8f36ddef3","versionType":"git"},{"lessThan":"bda93eec78cdbfe5cda00785cefebd443e56b88b","status":"affected","version":"b338d91703fae6f6afd67f3f75caa3b8f36ddef3","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["net/bluetooth/mgmt.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"6.1"},{"lessThan":"6.1","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"6.1.*","status":"unaffected","version":"6.1.168","versionType":"semver"},{"lessThanOrEqual":"6.6.*","status":"unaffected","version":"6.6.134","versionType":"semver"},{"lessThanOrEqual":"6.12.*","status":"unaffected","version":"6.12.81","versionType":"semver"},{"lessThanOrEqual":"6.18.*","status":"unaffected","version":"6.18.22","versionType":"semver"},{"lessThanOrEqual":"6.19.*","status":"unaffected","version":"6.19.12","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"7.0","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.1.168","versionStartIncluding":"6.1","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.6.134","versionStartIncluding":"6.1","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.12.81","versionStartIncluding":"6.1","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.18.22","versionStartIncluding":"6.1","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.19.12","versionStartIncluding":"6.1","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0","versionStartIncluding":"6.1","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: MGMT: validate mesh send advertising payload length\n\nmesh_send() currently bounds MGMT_OP_MESH_SEND by total command\nlength, but it never verifies that the bytes supplied for the\nflexible adv_data[] array actually match the embedded adv_data_len\nfield. MGMT_MESH_SEND_SIZE only covers the fixed header, so a\ntruncated command can still pass the existing 20..50 byte range\ncheck and later drive the async mesh send path past the end of the\nqueued command buffer.\n\nKeep rejecting zero-length and oversized advertising payloads, but\nvalidate adv_data_len explicitly and require the command length to\nexactly match the flexible array size before queueing the request."}],"providerMetadata":{"dateUpdated":"2026-05-01T14:15:21.561Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/24fa32369cf15d8fc918bdfe94097b12e6acada0"},{"url":"https://git.kernel.org/stable/c/244b639e6a3a8e26241e201004a3a9f764476631"},{"url":"https://git.kernel.org/stable/c/0b706fb2294aff3adfd54653bda1b5e356ad4566"},{"url":"https://git.kernel.org/stable/c/edb5898cfa91afe7e8f83eda18d93034c953d632"},{"url":"https://git.kernel.org/stable/c/562ed1954f0c1bff3422b7b752bd3dacf185edbf"},{"url":"https://git.kernel.org/stable/c/bda93eec78cdbfe5cda00785cefebd443e56b88b"}],"title":"Bluetooth: MGMT: validate mesh send advertising payload length","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2026-43017","datePublished":"2026-05-01T14:15:21.561Z","dateReserved":"2026-05-01T14:12:55.975Z","dateUpdated":"2026-05-01T14:15:21.561Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-01 15:16:45","lastModifiedDate":"2026-05-01 15:24:14","problem_types":[],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"43017","Ordinal":"1","Title":"Bluetooth: MGMT: validate mesh send advertising payload length","CVE":"CVE-2026-43017","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"43017","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: MGMT: validate mesh send advertising payload length\n\nmesh_send() currently bounds MGMT_OP_MESH_SEND by total command\nlength, but it never verifies that the bytes supplied for the\nflexible adv_data[] array actually match the embedded adv_data_len\nfield. MGMT_MESH_SEND_SIZE only covers the fixed header, so a\ntruncated command can still pass the existing 20..50 byte range\ncheck and later drive the async mesh send path past the end of the\nqueued command buffer.\n\nKeep rejecting zero-length and oversized advertising payloads, but\nvalidate adv_data_len explicitly and require the command length to\nexactly match the flexible array size before queueing the request.","Type":"Description","Title":"Bluetooth: MGMT: validate mesh send advertising payload length"}]}}}