A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.
[
{
"product": "Linux",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "before 5.1-rc1"
},
{
"status": "affected",
"version": "fixed in 5.1-rc1"
}
]
}
]
www.openwall.com/lists/oss-security/2019/06/27/2
www.openwall.com/lists/oss-security/2019/06/27/7
www.openwall.com/lists/oss-security/2019/06/28/1
www.openwall.com/lists/oss-security/2019/06/28/2
www.openwall.com/lists/oss-security/2019/08/12/1
access.redhat.com/errata/RHSA-2019:2029
access.redhat.com/errata/RHSA-2019:2043
access.redhat.com/errata/RHSA-2019:3309
access.redhat.com/errata/RHSA-2019:3517
access.redhat.com/errata/RHSA-2020:0740
bugzilla.novell.com/show_bug.cgi?id=1120758
bugzilla.redhat.com/show_bug.cgi?id=1663176
git.kernel.org/linus/7c9cbd0b5e38a1672fcd137894ace3b042dfbf69
lists.debian.org/debian-lts-announce/2019/05/msg00002.html
lists.debian.org/debian-lts-announce/2019/05/msg00041.html
lists.debian.org/debian-lts-announce/2019/05/msg00042.html
lore.kernel.org/linux-bluetooth/20190110062833.GA15047%40kroah.com/
marc.info/?l=oss-security&m=154721580222522&w=2
people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3459.html