CVE-2026-43020
Awaiting Analysis Awaiting Analysis - Queue
Bluetooth: MGMT LTK Load Validation Flaw in Linux Kernel

Publication date: 2026-05-01

Last updated on: 2026-05-01

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: validate LTK enc_size on load Load Long Term Keys stores the user-provided enc_size and later uses it to size fixed-size stack operations when replying to LE LTK requests. An enc_size larger than the 16-byte key buffer can therefore overflow the reply stack buffer. Reject oversized enc_size values while validating the management LTK record so invalid keys never reach the stored key state.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-01
Last Modified
2026-05-01
Generated
2026-05-07
AI Q&A
2026-05-01
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's Bluetooth management component related to handling Long Term Keys (LTK). Specifically, when loading LTKs, the system accepts a user-provided encryption size (enc_size) value. If this enc_size is larger than the expected 16-byte key buffer, it can cause a stack buffer overflow during the reply to LE LTK requests.

The issue arises because the enc_size is used to size fixed-size stack operations without proper validation, allowing an oversized enc_size to overflow the reply stack buffer. The vulnerability was fixed by adding validation to reject enc_size values that are too large, preventing invalid keys from being stored.


How can this vulnerability impact me? :

This vulnerability can lead to a stack buffer overflow in the Bluetooth management code of the Linux kernel. Such a buffer overflow could potentially be exploited by an attacker to execute arbitrary code, cause a denial of service (system crash), or escalate privileges on the affected system.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability involves an overflow caused by an oversized enc_size value in Bluetooth Long Term Keys (LTK) handling in the Linux kernel.

Immediate mitigation should focus on updating the Linux kernel to a version where this vulnerability is resolved, as the fix involves rejecting oversized enc_size values during validation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart