| 概要 | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix type confusion in l2cap_ecred_reconf_rsp() l2cap_ecred_reconf_rsp() casts the incoming data to struct This causes two problems: - The sizeof(*rsp) length check requires 8 bytes instead of the - rsp->result reads from offset 6 instead of offset 0, returning Fix by using the correct type. Also pass the already byte-swapped |
|---|---|
| 公表日 | 2026年5月6日1:16 |
| 登録日 | 2026年5月6日4:07 |
| 最終更新日 | 2026年5月6日1:16 |