CVE-2011-2492

CVE Details

Release Date:2011-07-28

Description


The bluetooth subsystem in the Linux kernel before 3.0-rc4 does not properly initialize certain data structures, which allows local users to obtain potentially sensitive information from kernel memory via a crafted getsockopt system call, related to (1) the l2cap_sock_getsockopt_old function in net/bluetooth/l2cap_sock.c and (2) the rfcomm_sock_getsockopt_old function in net/bluetooth/rfcomm/sock.c.

See more information about CVE-2011-2492 from MITRE CVE dictionary and NIST NVD


CVSS v2.0 metrics


NOTE: The following CVSS v2.0 metrics and score provided are preliminary and subject to review.

Base Score: 1.9 Base Metrics: AV:L/AC:M/Au:N/C:P/I:N/A:N
Access Vector: Local network Attack Complexity: Medium
Authentication: None required Confidentiality Impact: Partial
Integrity Impact: None Availability Impact: None

Errata information


PlatformErrataRelease Date
Oracle Linux version 5 (kernel)ELSA-2011-09272011-07-18
Oracle Linux version 5 (kernel-uek)ELSA-2011-20252011-08-24
Oracle Linux version 5 (ocfs2-2.6.18-238.19.1.0.1.el5)ELSA-2011-09272011-07-18
Oracle Linux version 5 (ofa-2.6.32-200.19.1.el5uek)ELSA-2011-20252011-08-24
Oracle Linux version 5 (oracleasm-2.6.18-238.19.1.0.1.el5)ELSA-2011-09272011-07-18
Oracle Linux version 6 (kernel)ELSA-2011-11892011-08-23
Oracle Linux version 6 (kernel-uek)ELSA-2011-20252011-08-24
Oracle Linux version 6 (ofa-2.6.32-200.19.1.el6uek)ELSA-2011-20252011-08-24



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete