Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-65mg-fq5m-qr37

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Integer underflow in the l2cap_config_req function in net/bluetooth/l2cap_core.c in the Linux kernel before 3.0 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a small command-size value within the command header of a Logical Link Control and Adaptation Protocol (L2CAP) configuration request, leading to a buffer overflow.

Integer underflow in the l2cap_config_req function in net/bluetooth/l2cap_core.c in the Linux kernel before 3.0 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a small command-size value within the command header of a Logical Link Control and Adaptation Protocol (L2CAP) configuration request, leading to a buffer overflow.

EPSS

Процентиль: 85%
0.02792
Низкий

Дефекты

CWE-191

Связанные уязвимости

ubuntu
почти 14 лет назад

Integer underflow in the l2cap_config_req function in net/bluetooth/l2cap_core.c in the Linux kernel before 3.0 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a small command-size value within the command header of a Logical Link Control and Adaptation Protocol (L2CAP) configuration request, leading to a buffer overflow.

redhat
почти 14 лет назад

Integer underflow in the l2cap_config_req function in net/bluetooth/l2cap_core.c in the Linux kernel before 3.0 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a small command-size value within the command header of a Logical Link Control and Adaptation Protocol (L2CAP) configuration request, leading to a buffer overflow.

nvd
почти 14 лет назад

Integer underflow in the l2cap_config_req function in net/bluetooth/l2cap_core.c in the Linux kernel before 3.0 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a small command-size value within the command header of a Logical Link Control and Adaptation Protocol (L2CAP) configuration request, leading to a buffer overflow.

debian
почти 14 лет назад

Integer underflow in the l2cap_config_req function in net/bluetooth/l2 ...

oracle-oval
почти 14 лет назад

ELSA-2011-2025: Unbreakable Enterprise kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 85%
0.02792
Низкий

Дефекты

CWE-191