Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-1353

Опубликовано: 24 апр. 2007
Источник: debian
EPSS Низкий

Описание

The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6fixed2.6.22-1package

EPSS

Процентиль: 26%
0.00085
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.

redhat
больше 18 лет назад

The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.

nvd
больше 18 лет назад

The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.

github
больше 3 лет назад

The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.

oracle-oval
около 18 лет назад

ELSA-2007-0376: Important: kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 26%
0.00085
Низкий