
oss-sec mailing list archives
CVE-2024-47248: Apache NimBLE: Buffer overflow in NimBLE MESH Bluetooth stack
From: Szymon Janc <janc () apache org>
Date: Tue, 26 Nov 2024 08:16:55 +0000
Severity: important Affected versions: - Apache NimBLE through 1.7.0 Description: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Apache NimBLE. Specially crafted MESH message could result in memory corruption when non-default build configuration is used. This issue affects Apache NimBLE: through 1.7.0. Users are recommended to upgrade to version 1.8.0, which fixes the issue. Credit: Wei Che Kao (Xiaobye), graduate student from National Yang Ming Chiao Tung University, Dept. of CS, Security and Systems Lab. (reporter) References: https://mynewt.apache.org/ https://www.cve.org/CVERecord?id=CVE-2024-47248
Current thread:
- CVE-2024-47248: Apache NimBLE: Buffer overflow in NimBLE MESH Bluetooth stack Szymon Janc (Nov 26)