The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Linux_kernel | Linux | * | 2.4.34.2 (including) |
Linux-source-2.6.15 | Ubuntu | dapper | * |
Linux-source-2.6.17 | Ubuntu | edgy | * |
Linux-source-2.6.20 | Ubuntu | feisty | * |
Red Hat Enterprise Linux 2.1 | RedHat | kernel-0:2.4.9-e.72 | * |
Red Hat Enterprise Linux 2.1 | RedHat | kernel-0:2.4.18-e.65 | * |
Red Hat Enterprise Linux 3 | RedHat | kernel-0:2.4.21-51.EL | * |
Red Hat Enterprise Linux 4 | RedHat | kernel-0:2.6.9-55.0.2.EL | * |
Red Hat Enterprise Linux 5 | RedHat | kernel-0:2.6.18-8.1.6.el5 | * |