[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025092459-CVE-2025-39889-7f8e@gregkh>
Date: Wed, 24 Sep 2025 13:02:59 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2025-39889: Bluetooth: l2cap: Check encryption key size on incoming connection
From: Greg Kroah-Hartman <gregkh@...nel.org>
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: l2cap: Check encryption key size on incoming connection
This is required for passing GAP/SEC/SEM/BI-04-C PTS test case:
Security Mode 4 Level 4, Responder - Invalid Encryption Key Size
- 128 bit
This tests the security key with size from 1 to 15 bytes while the
Security Mode 4 Level 4 requests 16 bytes key size.
Currently PTS fails with the following logs:
- expected:Connection Response:
Code: [3 (0x03)] Code
Identifier: (lt)WildCard: Exists(gt)
Length: [8 (0x0008)]
Destination CID: (lt)WildCard: Exists(gt)
Source CID: [64 (0x0040)]
Result: [3 (0x0003)] Connection refused - Security block
Status: (lt)WildCard: Exists(gt),
but received:Connection Response:
Code: [3 (0x03)] Code
Identifier: [1 (0x01)]
Length: [8 (0x0008)]
Destination CID: [64 (0x0040)]
Source CID: [64 (0x0040)]
Result: [0 (0x0000)] Connection Successful
Status: [0 (0x0000)] No further information available
And HCI logs:
< HCI Command: Read Encrypti.. (0x05|0x0008) plen 2
Handle: 14 Address: 00:1B:DC:F2:24:10 (Vencer Co., Ltd.)
> HCI Event: Command Complete (0x0e) plen 7
Read Encryption Key Size (0x05|0x0008) ncmd 1
Status: Success (0x00)
Handle: 14 Address: 00:1B:DC:F2:24:10 (Vencer Co., Ltd.)
Key size: 7
> ACL Data RX: Handle 14 flags 0x02 dlen 12
L2CAP: Connection Request (0x02) ident 1 len 4
PSM: 4097 (0x1001)
Source CID: 64
< ACL Data TX: Handle 14 flags 0x00 dlen 16
L2CAP: Connection Response (0x03) ident 1 len 8
Destination CID: 64
Source CID: 64
Result: Connection successful (0x0000)
Status: No further information available (0x0000)
The Linux kernel CVE team has assigned CVE-2025-39889 to this issue.
Affected and fixed versions
===========================
Issue introduced in 5.11 with commit 288c06973daae4637f25a0d1bdaf65fdbf8455f9 and fixed in 5.15.181 with commit 24b2cdfc16e9bd6ab3d03b8e01c590755bd3141f
Issue introduced in 5.11 with commit 288c06973daae4637f25a0d1bdaf65fdbf8455f9 and fixed in 6.1.135 with commit c6d527bbd3d3896375079f5dbc8b7f96734a3ba5
Issue introduced in 5.11 with commit 288c06973daae4637f25a0d1bdaf65fdbf8455f9 and fixed in 6.6.88 with commit 9e3114958d87ea88383cbbf38c89e04b8ea1bce5
Issue introduced in 5.11 with commit 288c06973daae4637f25a0d1bdaf65fdbf8455f9 and fixed in 6.12.25 with commit d49798ecd26e0ee7995a7fc1e90ca5cd9b4402d6
Issue introduced in 5.11 with commit 288c06973daae4637f25a0d1bdaf65fdbf8455f9 and fixed in 6.14.4 with commit d4ca2fd218caafbf50e3343ba1260c6a23b5676a
Issue introduced in 5.11 with commit 288c06973daae4637f25a0d1bdaf65fdbf8455f9 and fixed in 6.15 with commit 522e9ed157e3c21b4dd623c79967f72c21e45b78
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2025-39889
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
net/bluetooth/l2cap_core.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/24b2cdfc16e9bd6ab3d03b8e01c590755bd3141f
https://git.kernel.org/stable/c/c6d527bbd3d3896375079f5dbc8b7f96734a3ba5
https://git.kernel.org/stable/c/9e3114958d87ea88383cbbf38c89e04b8ea1bce5
https://git.kernel.org/stable/c/d49798ecd26e0ee7995a7fc1e90ca5cd9b4402d6
https://git.kernel.org/stable/c/d4ca2fd218caafbf50e3343ba1260c6a23b5676a
https://git.kernel.org/stable/c/522e9ed157e3c21b4dd623c79967f72c21e45b78
Powered by blists - more mailing lists