In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: btintel: Check dsbr size from EFI variable
Since the size of struct btintel_dsbr is already known, we can just
start there instead of querying the EFI variable size. If the final
result doesn't match what we expect also fail. This fixes a stack buffer
overflow when the EFI variable is larger than struct btintel_dsbr.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-07-10 08:15
Updated : 2025-11-18 12:55
NVD link : CVE-2025-38315
Mitre link : CVE-2025-38315
CVE.ORG link : CVE-2025-38315
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-674
Uncontrolled Recursion
