Back to bug 2151959
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Guilherme de Almeida Suckevicz | 2022-12-08 17:49:11 UTC | Depends On | 2151960 | |
| Alex | 2022-12-13 10:11:13 UTC | Depends On | 2152859, 2152858, 2152857, 2152860 | |
| Alex | 2022-12-13 10:18:45 UTC | Doc Text | A flaw integer overflow in the Linux kernel L2CAP bluetooth functionality was found in the way user generate malicious L2CAP_CONF_REQ packets. A local user or blue-tooth connection user could use this flaw to crash the system. | |
| RaTasha Tillery-Smith | 2022-12-13 14:40:37 UTC | Doc Text | A flaw integer overflow in the Linux kernel L2CAP bluetooth functionality was found in the way user generate malicious L2CAP_CONF_REQ packets. A local user or blue-tooth connection user could use this flaw to crash the system. | An integer overflow flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user generates malicious L2CAP_CONF_REQ packets. This flaw allows a local or bluetooth connection user to crash the system. |
| Red Hat Bugzilla | 2022-12-31 23:35:33 UTC | CC | fhrbata | |
| Red Hat Bugzilla | 2023-04-01 08:41:00 UTC | CC | dhoward | |
| Red Hat Bugzilla | 2023-07-07 08:30:29 UTC | Assignee | security-response-team | nobody |
Back to bug 2151959