{ "id": "CVE-2024-26887", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:10.297", "lastModified": "2024-04-17T12:48:07.510", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btusb: Fix memory leak\n\nThis checks if CONFIG_DEV_COREDUMP is enabled before attempting to clone\nthe skb and also make sure btmtk_process_coredump frees the skb passed\nfollowing the same logic." }, { "lang": "es", "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: Bluetooth: btusb: corrige la p\u00e9rdida de memoria. Esto verifica si CONFIG_DEV_COREDUMP est\u00e1 habilitado antes de intentar clonar el skb y tambi\u00e9n se asegura de que btmtk_process_coredump libere el skb pasado siguiendo la misma l\u00f3gica." } ], "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/620b9e60e4b55fa55540ce852a0f3c9e6091dbbc", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/79f4127a502c5905f04da1f20a7bbe07103fb77c", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/b08bd8f02a24e2b82fece5ac51dc1c3d9aa6c404", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/b10e6f6b160a60b98fb7476028f5a95405bbd725", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] }