DescriptionThe setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 188.8.131.52 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
|National Vulnerability Database|
- SUSE-SA:2007:035, published Thu, 14 Jun 2007 16:00:00 +0000