In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: refactor malicious adv data check
Check for out-of-bound read was being performed at the end of while
num_reports loop, and would fill journal with false positives. Added
check to beginning of loop processing so that it doesn't get checked
after ptr has been advanced.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/305e92f525450f3e1b5f5c9dc7eadb152d66a082 - Patch | |
References | () https://git.kernel.org/stable/c/5a539c08d743d9910631448da78af5e961664c0e - Patch | |
References | () https://git.kernel.org/stable/c/5c968affa804ba98c3c603f37ffea6fba618025e - Patch | |
References | () https://git.kernel.org/stable/c/7889b38a7f21ed19314f83194622b195d328465c - Patch | |
References | () https://git.kernel.org/stable/c/835d3706852537bf92eb23eb8635b8dee0c0aa67 - Patch | |
References | () https://git.kernel.org/stable/c/83d5196b65d1b29e27d7dd16a3b9b439fb1d2dba - Patch | |
References | () https://git.kernel.org/stable/c/8819f93cd4a443dfe547aa622b21f723757df3fb - Patch | |
References | () https://git.kernel.org/stable/c/899663be5e75dc0174dc8bda0b5e6826edf0b29a - Patch | |
References | () https://git.kernel.org/stable/c/bcea886771c3f22a590c8c8b9139a107bd7f1e1c - Patch |
18 Sep 2024, 17:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/305e92f525450f3e1b5f5c9dc7eadb152d66a082 - Patch | |
References | () https://git.kernel.org/stable/c/5a539c08d743d9910631448da78af5e961664c0e - Patch | |
References | () https://git.kernel.org/stable/c/5c968affa804ba98c3c603f37ffea6fba618025e - Patch | |
References | () https://git.kernel.org/stable/c/7889b38a7f21ed19314f83194622b195d328465c - Patch | |
References | () https://git.kernel.org/stable/c/835d3706852537bf92eb23eb8635b8dee0c0aa67 - Patch | |
References | () https://git.kernel.org/stable/c/83d5196b65d1b29e27d7dd16a3b9b439fb1d2dba - Patch | |
References | () https://git.kernel.org/stable/c/8819f93cd4a443dfe547aa622b21f723757df3fb - Patch | |
References | () https://git.kernel.org/stable/c/899663be5e75dc0174dc8bda0b5e6826edf0b29a - Patch | |
References | () https://git.kernel.org/stable/c/bcea886771c3f22a590c8c8b9139a107bd7f1e1c - Patch | |
First Time |
Linux
Linux linux Kernel |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CWE | CWE-125 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
20 Jun 2024, 12:43
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
20 Jun 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-20 11:15
Updated : 2024-11-21 06:36
NVD link : CVE-2021-47620
Mitre link : CVE-2021-47620
CVE.ORG link : CVE-2021-47620
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read