Scheduled maintenance: Some features related to account registration and licensing may be temporarily unavailable from Friday (May 8) at 1 PM to Sunday (May 10) at 5 PM (PST).
HomeDefectsLIN1023-22824
Fixed

LIN1023-22824 : Security Advisory - linux - CVE-2026-43062

Created: May 5, 2026    Updated: May 7, 2026
Resolved Date: May 6, 2026
Found In Version: 10.23.30.2
Fix Version: 10.23.30.21
Severity: Standard
Applicable for: Wind River Linux LTS 23
Component/s: Kernel

Description

In the Linux kernel, the following vulnerability has been resolved:  Bluetooth: L2CAP: Fix type confusion in l2cap_ecred_reconf_rsp()  l2cap_ecred_reconf_rsp() casts the incoming data to struct l2cap_ecred_conn_rsp (the ECRED *connection* response, 8 bytes with result at offset 6) instead of struct l2cap_ecred_reconf_rsp (2 bytes with result at offset 0).  This causes two problems:   - The sizeof(*rsp) length check requires 8 bytes instead of the    correct 2, so valid L2CAP_ECRED_RECONF_RSP packets are rejected    with -EPROTO.   - rsp->result reads from offset 6 instead of offset 0, returning    wrong data when the packet is large enough to pass the check.  Fix by using the correct type.  Also pass the already byte-swapped result variable to BT_DBG instead of the raw __le16 field.