Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8956

Опубликовано: 10 окт. 2016
Источник: debian
EPSS Низкий

Описание

The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.2.1-1package

Примечания

  • Fixed by: https://git.kernel.org/linus/951b6a0717db97ce420547222647bcc40bf1eacd (4.2-rc1)

EPSS

Процентиль: 9%
0.00035
Низкий

Связанные уязвимости

CVSS3: 6.1
ubuntu
почти 9 лет назад

The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.

CVSS3: 6.1
redhat
около 10 лет назад

The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.

CVSS3: 6.1
nvd
почти 9 лет назад

The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.

CVSS3: 6.1
github
около 3 лет назад

The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.

oracle-oval
больше 8 лет назад

ELSA-2016-3646: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS

Процентиль: 9%
0.00035
Низкий