Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2007-1353

Опубликовано: 18 апр. 2007
Источник: redhat
EPSS Низкий

Описание

The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=243259Bluetooth setsockopt() information leaks

EPSS

Процентиль: 26%
0.00085
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.

nvd
больше 18 лет назад

The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.

debian
больше 18 лет назад

The setsockopt function in the L2CAP and HCI Bluetooth support in the ...

github
больше 3 лет назад

The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.

oracle-oval
около 18 лет назад

ELSA-2007-0376: Important: kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 26%
0.00085
Низкий