The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel prior to 2.4.34.3 allows context-dependent malicious users to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linux linux kernel |