Описание
Integer underflow in the l2cap_config_req function in net/bluetooth/l2cap_core.c in the Linux kernel before 3.0 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a small command-size value within the command header of a Logical Link Control and Adaptation Protocol (L2CAP) configuration request, leading to a buffer overflow.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 3.0.0-11.18 |
| esm-infra-legacy/trusty | not-affected | 3.11.0-12.19 |
| hardy | released | 2.6.24-29.94 |
| lucid | released | 2.6.32-35.78 |
| maverick | released | 2.6.35-30.60 |
| natty | released | 2.6.38-12.51 |
| oneiric | not-affected | 3.0.0-11.18 |
| precise | not-affected | 3.1.0-1.1 |
| quantal | not-affected | |
| saucy | not-affected |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| hardy | DNE | |
| lucid | released | 2.6.32-319.39 |
| maverick | ignored | end of life |
| natty | DNE | |
| oneiric | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 3.4.0-1.3 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [3.4.0-1.3]] |
| lucid | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | DNE | |
| trusty | not-affected | 3.4.0-1.3 |
| trusty/esm | DNE | trusty was not-affected [3.4.0-1.3] |
| upstream | released | 3.0 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| hardy | DNE | |
| lucid | released | 2.6.31-611.29 |
| maverick | DNE | |
| natty | DNE | |
| oneiric | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 3.4.0-1.7 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [3.4.0-1.7]] |
| lucid | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | ignored | |
| trusty | not-affected | 3.4.0-1.7 |
| trusty/esm | DNE | trusty was not-affected [3.4.0-1.7] |
| upstream | released | 3.0 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 3.1.10-8.28 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [3.1.10-8.28]] |
| lucid | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | ignored | |
| trusty | not-affected | 3.1.10-8.28 |
| trusty/esm | DNE | trusty was not-affected [3.1.10-8.28] |
| upstream | released | 3.0 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| hardy | DNE | |
| lucid | released | 2.6.35-30.60~lucid1 |
| maverick | DNE | |
| natty | DNE | |
| oneiric | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| hardy | DNE | |
| lucid | released | 2.6.38-12.51~lucid1 |
| maverick | DNE | |
| natty | DNE | |
| oneiric | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| hardy | DNE | |
| lucid | not-affected | |
| maverick | DNE | |
| natty | DNE | |
| oneiric | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 3.0.0-3.18 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [3.0.0-3.18]] |
| lucid | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | ignored | |
| trusty | not-affected | 3.0.0-3.18 |
| trusty/esm | DNE | trusty was not-affected [3.0.0-3.18] |
| upstream | released | 3.0 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 3.4.0-3.21 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [3.4.0-3.21]] |
| lucid | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | ignored | |
| trusty | not-affected | 3.4.0-3.21 |
| trusty/esm | DNE | trusty was not-affected [3.4.0-3.21] |
| upstream | released | 3.0 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 3.4.0-4.19 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [3.4.0-4.19]] |
| lucid | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | ignored | |
| trusty | not-affected | 3.4.0-4.19 |
| trusty/esm | DNE | trusty was not-affected [3.4.0-4.19] |
| upstream | released | 3.0 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| hardy | DNE | |
| lucid | released | 2.6.32-219.37 |
| maverick | released | 2.6.32-419.37 |
| natty | DNE | |
| oneiric | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| hardy | DNE | |
| lucid | DNE | |
| maverick | released | 2.6.35-903.25 |
| natty | released | 2.6.38-1209.16 |
| oneiric | not-affected | 3.0.0-1204.9 |
| precise | not-affected | 3.0.0-1401.2 |
| quantal | not-affected | |
| saucy | not-affected |
Показывать по
Ссылки на источники
EPSS
8.3 High
CVSS2
Связанные уязвимости
Integer underflow in the l2cap_config_req function in net/bluetooth/l2cap_core.c in the Linux kernel before 3.0 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a small command-size value within the command header of a Logical Link Control and Adaptation Protocol (L2CAP) configuration request, leading to a buffer overflow.
Integer underflow in the l2cap_config_req function in net/bluetooth/l2cap_core.c in the Linux kernel before 3.0 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a small command-size value within the command header of a Logical Link Control and Adaptation Protocol (L2CAP) configuration request, leading to a buffer overflow.
Integer underflow in the l2cap_config_req function in net/bluetooth/l2 ...
Integer underflow in the l2cap_config_req function in net/bluetooth/l2cap_core.c in the Linux kernel before 3.0 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a small command-size value within the command header of a Logical Link Control and Adaptation Protocol (L2CAP) configuration request, leading to a buffer overflow.
ELSA-2011-2025: Unbreakable Enterprise kernel security and bug fix update (IMPORTANT)
EPSS
8.3 High
CVSS2