Multiple buffer overflows in the cmtp_recv_interopmsg function in the
Bluetooth driver (net/bluetooth/cmtp/capi.c) in the Linux kernel 2.4.22 up
to 126.96.36.199 and 2.6.2 before 188.8.131.52, and 2.6.19.x, allow remote attackers
to cause a denial of service (crash) and possibly execute arbitrary code
via CAPI messages with a large value for the length of the (1) manu
(manufacturer) or (2) serial (serial number) field.
Updated: 2016-03-23 03:27:47 UTC (commit 10817)