| Summary | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: SMP: force responder MITM requirements before building the pairing response smp_cmd_pairing_req() currently builds the pairing response from the tk_request() then sees an auth value without SMP_AUTH_MITM and may When the local side requires HIGH security, first verify that MITM can |
|---|---|
| Publication Date | May 8, 2026, 11:16 p.m. |
| Registration Date | May 9, 2026, 4:13 a.m. |
| Last Update | May 8, 2026, 11:16 p.m. |