Описание
Integer underflow in the l2cap_config_req function in net/bluetooth/l2cap_core.c in the Linux kernel before 3.0 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a small command-size value within the command header of a Logical Link Control and Adaptation Protocol (L2CAP) configuration request, leading to a buffer overflow.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 3.0.0-11.18 |
esm-infra-legacy/trusty | not-affected | 3.11.0-12.19 |
hardy | released | 2.6.24-29.94 |
lucid | released | 2.6.32-35.78 |
maverick | released | 2.6.35-30.60 |
natty | released | 2.6.38-12.51 |
oneiric | not-affected | 3.0.0-11.18 |
precise | not-affected | 3.1.0-1.1 |
quantal | not-affected | |
saucy | not-affected |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
hardy | DNE | |
lucid | released | 2.6.32-319.39 |
maverick | ignored | end of life |
natty | DNE | |
oneiric | DNE | |
precise | DNE | |
quantal | DNE | |
saucy | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 3.4.0-1.3 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [3.4.0-1.3]] |
lucid | DNE | |
precise | DNE | |
quantal | DNE | |
saucy | DNE | |
trusty | not-affected | 3.4.0-1.3 |
trusty/esm | DNE | trusty was not-affected [3.4.0-1.3] |
upstream | released | 3.0 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
hardy | DNE | |
lucid | released | 2.6.31-611.29 |
maverick | DNE | |
natty | DNE | |
oneiric | DNE | |
precise | DNE | |
quantal | DNE | |
saucy | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 3.4.0-1.7 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [3.4.0-1.7]] |
lucid | DNE | |
precise | DNE | |
quantal | DNE | |
saucy | ignored | |
trusty | not-affected | 3.4.0-1.7 |
trusty/esm | DNE | trusty was not-affected [3.4.0-1.7] |
upstream | released | 3.0 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 3.1.10-8.28 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [3.1.10-8.28]] |
lucid | DNE | |
precise | DNE | |
quantal | DNE | |
saucy | ignored | |
trusty | not-affected | 3.1.10-8.28 |
trusty/esm | DNE | trusty was not-affected [3.1.10-8.28] |
upstream | released | 3.0 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
hardy | DNE | |
lucid | released | 2.6.35-30.60~lucid1 |
maverick | DNE | |
natty | DNE | |
oneiric | DNE | |
precise | DNE | |
quantal | DNE | |
saucy | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
hardy | DNE | |
lucid | released | 2.6.38-12.51~lucid1 |
maverick | DNE | |
natty | DNE | |
oneiric | DNE | |
precise | DNE | |
quantal | DNE | |
saucy | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
hardy | DNE | |
lucid | not-affected | |
maverick | DNE | |
natty | DNE | |
oneiric | DNE | |
precise | DNE | |
quantal | DNE | |
saucy | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 3.0.0-3.18 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [3.0.0-3.18]] |
lucid | DNE | |
precise | DNE | |
quantal | DNE | |
saucy | ignored | |
trusty | not-affected | 3.0.0-3.18 |
trusty/esm | DNE | trusty was not-affected [3.0.0-3.18] |
upstream | released | 3.0 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 3.4.0-3.21 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [3.4.0-3.21]] |
lucid | DNE | |
precise | DNE | |
quantal | DNE | |
saucy | ignored | |
trusty | not-affected | 3.4.0-3.21 |
trusty/esm | DNE | trusty was not-affected [3.4.0-3.21] |
upstream | released | 3.0 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 3.4.0-4.19 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [3.4.0-4.19]] |
lucid | DNE | |
precise | DNE | |
quantal | DNE | |
saucy | ignored | |
trusty | not-affected | 3.4.0-4.19 |
trusty/esm | DNE | trusty was not-affected [3.4.0-4.19] |
upstream | released | 3.0 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
hardy | DNE | |
lucid | released | 2.6.32-219.37 |
maverick | released | 2.6.32-419.37 |
natty | DNE | |
oneiric | DNE | |
precise | DNE | |
quantal | DNE | |
saucy | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
hardy | DNE | |
lucid | DNE | |
maverick | released | 2.6.35-903.25 |
natty | released | 2.6.38-1209.16 |
oneiric | not-affected | 3.0.0-1204.9 |
precise | not-affected | 3.0.0-1401.2 |
quantal | not-affected | |
saucy | not-affected |
Показывать по
Ссылки на источники
EPSS
8.3 High
CVSS2
Связанные уязвимости
Integer underflow in the l2cap_config_req function in net/bluetooth/l2cap_core.c in the Linux kernel before 3.0 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a small command-size value within the command header of a Logical Link Control and Adaptation Protocol (L2CAP) configuration request, leading to a buffer overflow.
Integer underflow in the l2cap_config_req function in net/bluetooth/l2cap_core.c in the Linux kernel before 3.0 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a small command-size value within the command header of a Logical Link Control and Adaptation Protocol (L2CAP) configuration request, leading to a buffer overflow.
Integer underflow in the l2cap_config_req function in net/bluetooth/l2 ...
Integer underflow in the l2cap_config_req function in net/bluetooth/l2cap_core.c in the Linux kernel before 3.0 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a small command-size value within the command header of a Logical Link Control and Adaptation Protocol (L2CAP) configuration request, leading to a buffer overflow.
ELSA-2011-2025: Unbreakable Enterprise kernel security and bug fix update (IMPORTANT)
EPSS
8.3 High
CVSS2