We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_core: Fix possible buffer overflow struct hci_dev_info has a fixed size name[8] field so in the event that hdev->name is bigger than that strcpy would attempt to write past its size, so this fixes this problem by switching to use strscpy.
Reserved 2024-02-19 | Published 2024-04-17 | Updated 2025-05-07 | Assigner Linuxgit.kernel.org/...c/6d5a9d4a7bcbb7534ce45a18a52e7bd23e69d8ac
git.kernel.org/...c/54a03e4ac1a41edf8a5087bd59f8241b0de96d3d
git.kernel.org/...c/d47e6c1932cee02954ea588c9f09fd5ecefeadfc
git.kernel.org/...c/2e845867b4e279eff0a19ade253390470e07e8a1
git.kernel.org/...c/a41c8efe659caed0e21422876bbb6b73c15b5244
git.kernel.org/...c/8c28598a2c29201d2ba7fc37539a7d41c264fb10
git.kernel.org/...c/2edce8e9a99dd5e4404259d52e754fdc97fb42c2
git.kernel.org/...c/81137162bfaa7278785b24c1fd2e9e74f082e8e4
Support options