In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: qca: fix info leak when fetching board id
Add the missing sanity check when fetching the board id to avoid leaking slab data when later requesting the firmware.
[
{
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 867.0,
"function_hash": "137208416819004841711665141048240011164"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ba307abed5e09759845c735ba036f8c12f55b209",
"target": {
"file": "drivers/bluetooth/btqca.c",
"function": "qca_read_fw_board_id"
},
"id": "CVE-2024-36033-4860f883"
},
{
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"238559160792543185229144312885895016982",
"32642782089117992473205294915090699559",
"50205152964048368390232448953076030925"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0adcf6be1445ed50bfd4a451a7a782568f270197",
"target": {
"file": "drivers/bluetooth/btqca.c"
},
"id": "CVE-2024-36033-7b4d0993"
},
{
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 867.0,
"function_hash": "137208416819004841711665141048240011164"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0adcf6be1445ed50bfd4a451a7a782568f270197",
"target": {
"file": "drivers/bluetooth/btqca.c",
"function": "qca_read_fw_board_id"
},
"id": "CVE-2024-36033-d48713e4"
},
{
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"238559160792543185229144312885895016982",
"32642782089117992473205294915090699559",
"50205152964048368390232448953076030925"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ba307abed5e09759845c735ba036f8c12f55b209",
"target": {
"file": "drivers/bluetooth/btqca.c"
},
"id": "CVE-2024-36033-f4ade1a9"
}
]