CVE-2026-43020
Published: Fri, 01 May 2026 15:16
Summary
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: validate LTK enc_size on load Load Long Term Keys stores the user-provided enc_size and later uses it to size fix
Details
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: validate LTK enc_size on load Load Long Term Keys stores the user-provided enc_size and later uses it to size fixed-size stack operations when replying to LE LTK requests. An enc_size larger than the 16-byte key buffer can therefore overflow the reply stack buffer. Reject oversized enc_size values while validating the management LTK record so invalid keys never reach the stored key state.
Are YOU affected by CVE-2026-43020?
5-second check on your actual server. Reads /etc/os-release, uname -r, and dpkg-query; matches against the live USN + Debian Security Tracker feeds; tells you whether CVE-2026-43020 (and any other live CVE) applies. Anonymous, no signup.
curl https://mindsparkstack.com/scan.sh | bash
References
- https://git.kernel.org/stable/c/0f37d1e65c6d71ad94ccfb5c602163c525db789d
- https://git.kernel.org/stable/c/257cdb960d8ff6d60bb6461b03c814b6cf0c9e64
- https://git.kernel.org/stable/c/40ba329e8b4cd2fb11b0caf5e6a543ceaebb6009
- https://git.kernel.org/stable/c/50fb64defa72a3fecd0af1ca7c6b47b5c5c2b257
- https://git.kernel.org/stable/c/82f342b3b006ca1d65f4890c05f2ec32fcb808b6
- https://git.kernel.org/stable/c/b8dbe9648d69059cfe3a28917bfbf7e61efd7f15
- https://git.kernel.org/stable/c/c34577f517b556fb6ca173d45bf7e766ae2564ce
- https://git.kernel.org/stable/c/f71695e81f4cb428f3c7e2138eae88199005b52c
StackPatch runs this match against YOUR installed packages every hour
Free 1-server / $99 lifetime founder seat (50 only) / $19+/mo monthly. Indie pricing.