| Summary | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: SMP: derive legacy responder STK authentication from MITM state The legacy responder path in smp_random() currently labels the stored For Just Works/Confirm legacy pairing, SMP_FLAG_MITM_AUTH stays clear This also keeps the legacy path aligned with the Secure Connections code, |
|---|---|
| Publication Date | May 2, 2026, 12:16 a.m. |
| Registration Date | May 2, 2026, 4:07 a.m. |
| Last Update | May 2, 2026, 12:24 a.m. |