Multiple buffer overflows in the cmtp_recv_interopmsg function in the
Bluetooth driver (net/bluetooth/cmtp/capi.c) in the Linux kernel 2.4.22 up
to 22.214.171.124 and 2.6.2 before 126.96.36.199, and 2.6.19.x, allow remote attackers
to cause a denial of service (crash) and possibly execute arbitrary code
via CAPI messages with a large value for the length of the (1) manu
(manufacturer) or (2) serial (serial number) field.
Updated: 2015-10-17 03:26:51 UTC (commit 10086)