APPLIED: [SRU][M/F][PATCH 0/1] CVE-2024-26889
Roxana Nicolescu
roxana.nicolescu at canonical.com
Mon May 27 07:43:01 UTC 2024
On 02/05/2024 00:15, Bethany Jamison wrote:
> [Impact]
>
> In the Linux kernel, the following vulnerability has been resolved:
>
> Bluetooth: hci_core: Fix possible buffer overflow
>
> struct hci_dev_info has a fixed size name[8] field so in the event that
> hdev->name is bigger than that strcpy would attempt to write past its
> size, so this fixes this problem by switching to use strscpy.
>
> [Fix]
>
> Mantic: Clean cherry-pick from linux-6.6.y
> Jammy: pending
> Focal: Mantic patch applied cleanly
> Bionic: not-affected
> Xenial: not-affected
> Trusty: not-affected
>
> [Test Case]
>
> Compile and boot tested.
>
> [Where problems could occur]
>
> This fix affects those who use Bluetooth HCI, an issue with this fix
> would be visable to the user via corrupted data or unexpected system
> behavior.
>
> Luiz Augusto von Dentz (1):
> Bluetooth: hci_core: Fix possible buffer overflow
>
> net/bluetooth/hci_core.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
Applied to mantic:linux, focal:linux master-next branches. Thanks!
More information about the kernel-team
mailing list