2024-04-17 12:03:32 +00:00
{
"id" : "CVE-2024-26887" ,
"sourceIdentifier" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"published" : "2024-04-17T11:15:10.297" ,
2024-04-17 14:03:29 +00:00
"lastModified" : "2024-04-17T12:48:07.510" ,
"vulnStatus" : "Awaiting Analysis" ,
2024-04-17 12:03:32 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btusb: Fix memory leak\n\nThis checks if CONFIG_DEV_COREDUMP is enabled before attempting to clone\nthe skb and also make sure btmtk_process_coredump frees the skb passed\nfollowing the same logic."
}
] ,
"metrics" : { } ,
"references" : [
{
"url" : "https://git.kernel.org/stable/c/620b9e60e4b55fa55540ce852a0f3c9e6091dbbc" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/79f4127a502c5905f04da1f20a7bbe07103fb77c" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/b08bd8f02a24e2b82fece5ac51dc1c3d9aa6c404" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/b10e6f6b160a60b98fb7476028f5a95405bbd725" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}