We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btintel: Check dsbr size from EFI variable Since the size of struct btintel_dsbr is already known, we can just start there instead of querying the EFI variable size. If the final result doesn't match what we expect also fail. This fixes a stack buffer overflow when the EFI variable is larger than struct btintel_dsbr.
Reserved 2025-04-16 | Published 2025-07-10 | Updated 2025-07-10 | Assigner Linuxgit.kernel.org/...c/9427f6081f37c795a8bd29d0ee72a4da3bd64af8
git.kernel.org/...c/7b8526bb489780ccc0caffc446ecabec83cfe568
git.kernel.org/...c/3aa1dc3c9060e335e82e9c182bf3d1db29220b1b
Support options