| 概要 | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: SMP: derive legacy responder STK authentication from MITM state The legacy responder path in smp_random() currently labels the stored For Just Works/Confirm legacy pairing, SMP_FLAG_MITM_AUTH stays clear This also keeps the legacy path aligned with the Secure Connections code, |
|---|---|
| 公表日 | 2026年5月2日0:16 |
| 登録日 | 2026年5月2日4:07 |
| 最終更新日 | 2026年5月2日0:24 |