Due to an unchecked buffer length, a specially crafted L2CAP packet can cause a buffer overflow. This buffer overflow triggers an assert, which results in a temporary denial of service.
If a watchdog timer is not enabled, a hard reset is required to recover the device.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://community.silabs.com/068Vm00000F9zre |
History
Fri, 20 Dec 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 19 Dec 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Due to an unchecked buffer length, a specially crafted L2CAP packet can cause a buffer overflow. This buffer overflow triggers an assert, which results in a temporary denial of service. If a watchdog timer is not enabled, a hard reset is required to recover the device. | |
Title | Denial of Service in Silicon Labs RS9116 Bluetooth SDK | |
Weaknesses | CWE-617 CWE-787 |
|
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Silabs
Published: 2024-12-19T19:24:08.214Z
Updated: 2024-12-20T17:38:51.488Z
Reserved: 2024-07-26T18:12:36.477Z
Link: CVE-2024-7139
Vulnrichment
Updated: 2024-12-20T16:45:47.288Z
NVD
Status : Received
Published: 2024-12-19T20:15:08.073
Modified: 2024-12-19T20:15:08.073
Link: CVE-2024-7139
Redhat
No data.