|
Message-ID: <05592a3b-c7a6-9c1c-c024-4c7f6e8b11f6@apache.org> Date: Tue, 26 Nov 2024 08:17:07 +0000 From: Szymon Janc <janc@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2024-47249: Apache NimBLE: Lack of input sanitization leading to out-of-bound reads in multiple advertisement handler Severity: low Affected versions: - Apache NimBLE through 1.7.0 Description: Improper Validation of Array Index vulnerability in Apache NimBLE. Lack of input validation for HCI events from controller could result in out-of-bound memory corruption and crash. This issue requires broken or bogus Bluetooth controller and thus severity is considered low. This issue affects Apache NimBLE: through 1.7.0. Users are recommended to upgrade to version 1.8.0, which fixes the issue. Credit: Eunkyu Lee (reporter) References: https://mynewt.apache.org/ https://www.cve.org/CVERecord?id=CVE-2024-47249
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.