In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
IntheLinuxkernel,thefollowingvulnerabilityhasbeenresolved:Bluetooth:hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In theLinux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attemptto write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
IntheLinuxkernel,thefollowingvulnerabilityhas been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes thisproblem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has afixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info has a fixed size name[8] field so in the event thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.
| linux | | https://git.kernel.org/linus/81137162bfaa7278785b24c1fd2e9e74f082e8e4 | https://git.kernel.org/linus/dcda165706b9fbfd685898d46a6749d7d397e0c0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_core: Fix possible buffer overflowstruct hci_dev_info hasa fixed size name[8] field so in theevent thathdev->name is bigger than that strcpy would attempt to write past itssize, so this fixes this problem by switching to use strscpy.