Description
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_core: Fix possible buffer overflow struct hci_dev_info has a fixed size name[8] field so in the event that hdev->name is bigger than that strcpy would attempt to write past its size, so this fixes this problem by switching to use strscpy.
Product status
194ab82c1ea187512ff2f822124bd05b63fc9f76 before 6d5a9d4a7bcbb7534ce45a18a52e7bd23e69d8ac
b48595f5b1c6e81e06e164e7d2b7a30b1776161e before 54a03e4ac1a41edf8a5087bd59f8241b0de96d3d
ffb060b136dd75a033ced0fc0aed2882c02e8b56 before d47e6c1932cee02954ea588c9f09fd5ecefeadfc
bbec1724519ecd9c468d1186a8f30b7567175bfb before 2e845867b4e279eff0a19ade253390470e07e8a1
dcda165706b9fbfd685898d46a6749d7d397e0c0 before a41c8efe659caed0e21422876bbb6b73c15b5244
dcda165706b9fbfd685898d46a6749d7d397e0c0 before 8c28598a2c29201d2ba7fc37539a7d41c264fb10
dcda165706b9fbfd685898d46a6749d7d397e0c0 before 2edce8e9a99dd5e4404259d52e754fdc97fb42c2
dcda165706b9fbfd685898d46a6749d7d397e0c0 before 81137162bfaa7278785b24c1fd2e9e74f082e8e4
d9ce7d438366431e5688be98d8680336ce0a0f8d
a55d53ad5c86aee3f6da50ee73626008997673fa
5558f4312dca43cebfb9a1aab3d632be91bbb736
6.6
Any version before 6.6
4.19.311
5.4.273
5.10.214
5.15.153
6.6.23
6.7.11
6.8.2
6.9
References
git.kernel.org/...c/6d5a9d4a7bcbb7534ce45a18a52e7bd23e69d8ac
git.kernel.org/...c/54a03e4ac1a41edf8a5087bd59f8241b0de96d3d
git.kernel.org/...c/d47e6c1932cee02954ea588c9f09fd5ecefeadfc
git.kernel.org/...c/2e845867b4e279eff0a19ade253390470e07e8a1
git.kernel.org/...c/a41c8efe659caed0e21422876bbb6b73c15b5244
git.kernel.org/...c/8c28598a2c29201d2ba7fc37539a7d41c264fb10
git.kernel.org/...c/2edce8e9a99dd5e4404259d52e754fdc97fb42c2
git.kernel.org/...c/81137162bfaa7278785b24c1fd2e9e74f082e8e4