Description
The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1356-1 | New Linux 2.6.18 packages fix several vulnerabilities |
Debian DSA |
DSA-1503-1 | New Linux kernel 2.4.27 packages fix several issues |
Debian DSA |
DSA-1503-2 | New Linux kernel 2.4.27 packages fix several issues |
Debian DSA |
DSA-1504-1 | New Linux kernel 2.6.8 packages fix several issues |
EUVD |
EUVD-2007-1350 | The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer. |
Ubuntu USN |
USN-470-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-486-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-489-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T12:50:35.205Z
Reserved: 2007-03-08T00:00:00.000Z
Link: CVE-2007-1353
No data.
Status : Modified
Published: 2007-04-24T16:19:00.000
Modified: 2026-04-23T00:35:47.467
Link: CVE-2007-1353
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN