In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: btintel: Check dsbr size from EFI variable
Since the size of struct btintel_dsbr is already known, we can just start there instead of querying the EFI variable size. If the final result doesn't match what we expect also fail. This fixes a stack buffer overflow when the EFI variable is larger than struct btintel_dsbr.
| Software | From | Fixed in |
|---|---|---|
| linux / linux_kernel | 6.11.1 | 6.12.34 |
| linux / linux_kernel | 6.13 | 6.15.3 |
| linux / linux_kernel | 6.11 | 6.11.x |
| linux / linux_kernel | 6.11-rc6 | 6.11-rc6.x |
| linux / linux_kernel | 6.11-rc7 | 6.11-rc7.x |