In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_core: Fix possible buffer overflow
struct hci_dev_info has a fixed size name[8] field so in the event that
hdev->name is bigger than that strcpy would attempt to write past its
size, so this fixes this problem by switching to use strscpy.
References
Configurations
No configuration.
History
17 Nov 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Nov 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
31 Oct 2024, 16:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | CWE-120 |
27 Jun 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
17 Apr 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-17 11:15
Updated : 2024-11-17 15:15
NVD link : CVE-2024-26889
Mitre link : CVE-2024-26889
CVE.ORG link : CVE-2024-26889
JSON object : View
Products Affected
No product.
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')