-

CVE-2025-39889

In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: l2cap: Check encryption key size on incoming connection

This is required for passing GAP/SEC/SEM/BI-04-C PTS test case:
  Security Mode 4 Level 4, Responder - Invalid Encryption Key Size
  - 128 bit

This tests the security key with size from 1 to 15 bytes while the
Security Mode 4 Level 4 requests 16 bytes key size.

Currently PTS fails with the following logs:
- expected:Connection Response:
    Code: [3 (0x03)] Code
    Identifier: (lt)WildCard: Exists(gt)
    Length: [8 (0x0008)]
    Destination CID: (lt)WildCard: Exists(gt)
    Source CID: [64 (0x0040)]
    Result: [3 (0x0003)] Connection refused - Security block
    Status: (lt)WildCard: Exists(gt),
but received:Connection Response:
    Code: [3 (0x03)] Code
    Identifier: [1 (0x01)]
    Length: [8 (0x0008)]
    Destination CID: [64 (0x0040)]
    Source CID: [64 (0x0040)]
    Result: [0 (0x0000)] Connection Successful
    Status: [0 (0x0000)] No further information available

And HCI logs:
< HCI Command: Read Encrypti.. (0x05|0x0008) plen 2
        Handle: 14 Address: 00:1B:DC:F2:24:10 (Vencer Co., Ltd.)
> HCI Event: Command Complete (0x0e) plen 7
      Read Encryption Key Size (0x05|0x0008) ncmd 1
        Status: Success (0x00)
        Handle: 14 Address: 00:1B:DC:F2:24:10 (Vencer Co., Ltd.)
        Key size: 7
> ACL Data RX: Handle 14 flags 0x02 dlen 12
      L2CAP: Connection Request (0x02) ident 1 len 4
        PSM: 4097 (0x1001)
        Source CID: 64
< ACL Data TX: Handle 14 flags 0x00 dlen 16
      L2CAP: Connection Response (0x03) ident 1 len 8
        Destination CID: 64
        Source CID: 64
        Result: Connection successful (0x0000)
        Status: No further information available (0x0000)

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 24b2cdfc16e9bd6ab3d03b8e01c590755bd3141f
Version 288c06973daae4637f25a0d1bdaf65fdbf8455f9
Status affected
Version < c6d527bbd3d3896375079f5dbc8b7f96734a3ba5
Version 288c06973daae4637f25a0d1bdaf65fdbf8455f9
Status affected
Version < 9e3114958d87ea88383cbbf38c89e04b8ea1bce5
Version 288c06973daae4637f25a0d1bdaf65fdbf8455f9
Status affected
Version < d49798ecd26e0ee7995a7fc1e90ca5cd9b4402d6
Version 288c06973daae4637f25a0d1bdaf65fdbf8455f9
Status affected
Version < d4ca2fd218caafbf50e3343ba1260c6a23b5676a
Version 288c06973daae4637f25a0d1bdaf65fdbf8455f9
Status affected
Version < 522e9ed157e3c21b4dd623c79967f72c21e45b78
Version 288c06973daae4637f25a0d1bdaf65fdbf8455f9
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.11
Status affected
Version < 5.11
Version 0
Status unaffected
Version <= 5.15.*
Version 5.15.181
Status unaffected
Version <= 6.1.*
Version 6.1.135
Status unaffected
Version <= 6.6.*
Version 6.6.88
Status unaffected
Version <= 6.12.*
Version 6.12.25
Status unaffected
Version <= 6.14.*
Version 6.14.4
Status unaffected
Version <= *
Version 6.15
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.033
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String