A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.
[
{
"product": "Linux",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "before 5.1-rc1"
},
{
"status": "affected",
"version": "fixed in 5.1-rc1"
}
]
}
]
www.openwall.com/lists/oss-security/2019/06/27/2
www.openwall.com/lists/oss-security/2019/06/27/7
www.openwall.com/lists/oss-security/2019/06/28/1
www.openwall.com/lists/oss-security/2019/06/28/2
www.openwall.com/lists/oss-security/2019/08/12/1
access.redhat.com/errata/RHSA-2019:2029
access.redhat.com/errata/RHSA-2019:2043
access.redhat.com/errata/RHSA-2019:3309
access.redhat.com/errata/RHSA-2019:3517
access.redhat.com/errata/RHSA-2020:0740
bugzilla.redhat.com/show_bug.cgi?id=1663179
git.kernel.org/linus/af3d5d1c87664a4f150fcf3534c6567cb19909b0
lists.debian.org/debian-lts-announce/2019/05/msg00002.html
lists.debian.org/debian-lts-announce/2019/05/msg00041.html
lists.debian.org/debian-lts-announce/2019/05/msg00042.html
lore.kernel.org/linux-bluetooth/20190110062917.GB15047%40kroah.com/
marc.info/?l=oss-security&m=154721580222522&w=2
people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3460.html