CVE-2025-39889
Gravedad CVSS v3.1:
MEDIA
Tipo:
CWE-326
Fortaleza de cifrado inadecuada
Fecha de publicación:
24/09/2025
Última modificación:
12/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
Bluetooth: l2cap: Check encryption key size on incoming connection<br />
<br />
This is required for passing GAP/SEC/SEM/BI-04-C PTS test case:<br />
Security Mode 4 Level 4, Responder - Invalid Encryption Key Size<br />
- 128 bit<br />
<br />
This tests the security key with size from 1 to 15 bytes while the<br />
Security Mode 4 Level 4 requests 16 bytes key size.<br />
<br />
Currently PTS fails with the following logs:<br />
- expected:Connection Response:<br />
Code: [3 (0x03)] Code<br />
Identifier: (lt)WildCard: Exists(gt)<br />
Length: [8 (0x0008)]<br />
Destination CID: (lt)WildCard: Exists(gt)<br />
Source CID: [64 (0x0040)]<br />
Result: [3 (0x0003)] Connection refused - Security block<br />
Status: (lt)WildCard: Exists(gt),<br />
but received:Connection Response:<br />
Code: [3 (0x03)] Code<br />
Identifier: [1 (0x01)]<br />
Length: [8 (0x0008)]<br />
Destination CID: [64 (0x0040)]<br />
Source CID: [64 (0x0040)]<br />
Result: [0 (0x0000)] Connection Successful<br />
Status: [0 (0x0000)] No further information available<br />
<br />
And HCI logs:<br />
HCI Event: Command Complete (0x0e) plen 7<br />
Read Encryption Key Size (0x05|0x0008) ncmd 1<br />
Status: Success (0x00)<br />
Handle: 14 Address: 00:1B:DC:F2:24:10 (Vencer Co., Ltd.)<br />
Key size: 7<br />
> ACL Data RX: Handle 14 flags 0x02 dlen 12<br />
L2CAP: Connection Request (0x02) ident 1 len 4<br />
PSM: 4097 (0x1001)<br />
Source CID: 64<br />
Impacto
Puntuación base 3.x
5.50
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (incluyendo) | 5.15.181 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (incluyendo) | 6.1.135 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (incluyendo) | 6.6.88 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (incluyendo) | 6.12.25 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (incluyendo) | 6.14.4 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/24b2cdfc16e9bd6ab3d03b8e01c590755bd3141f
- https://git.kernel.org/stable/c/522e9ed157e3c21b4dd623c79967f72c21e45b78
- https://git.kernel.org/stable/c/9e3114958d87ea88383cbbf38c89e04b8ea1bce5
- https://git.kernel.org/stable/c/c6d527bbd3d3896375079f5dbc8b7f96734a3ba5
- https://git.kernel.org/stable/c/d49798ecd26e0ee7995a7fc1e90ca5cd9b4402d6
- https://git.kernel.org/stable/c/d4ca2fd218caafbf50e3343ba1260c6a23b5676a



