Stack-based buffer overflow in Linux kernel - CVE-2026-43020
Published: May 2, 2026
Linux kernel
Detailed vulnerability description
The vulnerability allows a remote user to cause a denial of service or execute arbitrary code.
The vulnerability exists due to a stack-based buffer overflow in the Bluetooth MGMT Long Term Key load and reply handling logic when processing a crafted management LTK record with an oversized enc_size value. A remote user can supply a specially crafted LTK record to overflow a reply stack buffer to cause a denial of service or execute arbitrary code.
How to mitigate CVE-2026-43020
Sources
- https://git.kernel.org/stable/c/0f37d1e65c6d71ad94ccfb5c602163c525db789d
- https://git.kernel.org/stable/c/257cdb960d8ff6d60bb6461b03c814b6cf0c9e64
- https://git.kernel.org/stable/c/40ba329e8b4cd2fb11b0caf5e6a543ceaebb6009
- https://git.kernel.org/stable/c/50fb64defa72a3fecd0af1ca7c6b47b5c5c2b257
- https://git.kernel.org/stable/c/82f342b3b006ca1d65f4890c05f2ec32fcb808b6
- https://git.kernel.org/stable/c/b8dbe9648d69059cfe3a28917bfbf7e61efd7f15
- https://git.kernel.org/stable/c/c34577f517b556fb6ca173d45bf7e766ae2564ce
- https://git.kernel.org/stable/c/f71695e81f4cb428f3c7e2138eae88199005b52c