CVE-2026-43020

high

Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: validate LTK enc_size on load Load Long Term Keys stores the user-provided enc_size and later uses it to size fixed-size stack operations when replying to LE LTK requests. An enc_size larger than the 16-byte key buffer can therefore overflow the reply stack buffer. Reject oversized enc_size values while validating the management LTK record so invalid keys never reach the stored key state.

References

https://git.kernel.org/stable/c/f71695e81f4cb428f3c7e2138eae88199005b52c

https://git.kernel.org/stable/c/c34577f517b556fb6ca173d45bf7e766ae2564ce

https://git.kernel.org/stable/c/b8dbe9648d69059cfe3a28917bfbf7e61efd7f15

https://git.kernel.org/stable/c/82f342b3b006ca1d65f4890c05f2ec32fcb808b6

https://git.kernel.org/stable/c/50fb64defa72a3fecd0af1ca7c6b47b5c5c2b257

https://git.kernel.org/stable/c/40ba329e8b4cd2fb11b0caf5e6a543ceaebb6009

https://git.kernel.org/stable/c/257cdb960d8ff6d60bb6461b03c814b6cf0c9e64

https://git.kernel.org/stable/c/0f37d1e65c6d71ad94ccfb5c602163c525db789d

Details

Source: Mitre, NVD

Published: 2026-05-01

Updated: 2026-05-01

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 7.1

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

Severity: High

EPSS

EPSS: 0.00024