Description
Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’) vulnerability in Apache NimBLE. Specially crafted MESH message could result in memory corruption when non-default build configuration is used. This issue affects Apache NimBLE: through 1.7.0. Users are recommended to upgrade to version 1.8.0, which fixes the issue.
References
https://lists.apache.org/thread/z8m7jqh54xybf9kz8q2l3tz92zsj7tmz