In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: btusb: Fix memory leak This checks if CONFIG_DEV_COREDUMP is
enabled before attempting to clone the skb and also make sure
btmtk_process_coredump frees the skb passed following the same logic.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 24.04 | noarch | linux | < 6.8.0-35.35 | UNKNOWN |
ubuntu | 24.04 | noarch | linux-aws | < 6.8.0-1009.9 | UNKNOWN |
ubuntu | 24.04 | noarch | linux-azure | < 6.8.0-1008.8 | UNKNOWN |
ubuntu | 24.04 | noarch | linux-gcp | < 6.8.0-1008.9 | UNKNOWN |
ubuntu | 24.04 | noarch | linux-gke | < 6.8.0-1004.7 | UNKNOWN |
ubuntu | 24.04 | noarch | linux-ibm | < 6.8.0-1006.6 | UNKNOWN |
ubuntu | 24.04 | noarch | linux-lowlatency | < 6.8.0-35.35.1 | UNKNOWN |
ubuntu | 24.04 | noarch | linux-oem-6.8 | < 6.8.0-1006.6 | UNKNOWN |
ubuntu | 24.04 | noarch | linux-oracle | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-raspi | < 6.8.0-1005.5 | UNKNOWN |
git.kernel.org/linus/79f4127a502c5905f04da1f20a7bbe07103fb77c (6.9-rc1)
git.kernel.org/stable/c/620b9e60e4b55fa55540ce852a0f3c9e6091dbbc
git.kernel.org/stable/c/79f4127a502c5905f04da1f20a7bbe07103fb77c
git.kernel.org/stable/c/b08bd8f02a24e2b82fece5ac51dc1c3d9aa6c404
git.kernel.org/stable/c/b10e6f6b160a60b98fb7476028f5a95405bbd725
launchpad.net/bugs/cve/CVE-2024-26887
nvd.nist.gov/vuln/detail/CVE-2024-26887
security-tracker.debian.org/tracker/CVE-2024-26887
ubuntu.com/security/notices/USN-6816-1
ubuntu.com/security/notices/USN-6817-1
ubuntu.com/security/notices/USN-6817-2
ubuntu.com/security/notices/USN-6817-3
www.cve.org/CVERecord?id=CVE-2024-26887