| Summary | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix type confusion in l2cap_ecred_reconf_rsp() l2cap_ecred_reconf_rsp() casts the incoming data to struct This causes two problems: - The sizeof(*rsp) length check requires 8 bytes instead of the - rsp->result reads from offset 6 instead of offset 0, returning Fix by using the correct type. Also pass the already byte-swapped |
|---|---|
| Publication Date | May 6, 2026, 1:16 a.m. |
| Registration Date | May 6, 2026, 4:07 a.m. |
| Last Update | May 6, 2026, 1:16 a.m. |