Candidate: CVE-2007-1353 References: http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.34.3 http://www.securityfocus.com/bid/23594 http://www.frsirt.com/english/advisories/2007/1495 http://secunia.com/advisories/24976 Description: The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer. Ubuntu-Description: Ilja van Sprundel discovered that Bluetooth setsockopt calls could leak kernel memory contents via an uninitialized stack buffer. A local attacker could exploit this flaw to view sensitive kernel information. Notes: jmm> This was fixed in git on 2007-05-04, marking 2.6.22 as fixed version Bugs: upstream: released (2.6.22) linux-2.6: released (2.6.22-1) 2.6.18-etch-security: released (2.6.18.dfsg.1-13etch1) [bugfix/bluetooth-l2cap-hci-info-leaks.patch] 2.6.8-sarge-security: released (2.6.8-17sarge1) [bluetooth-l2cap-hci-info-leaks.dpatch] 2.4.27-sarge-security: released (2.4.27-10sarge6) [244_bluetooth-l2cap-hci-info-leaks.diff] 2.6.15-dapper-security: released (2.6.15-28.57) 2.6.17-edgy-security: released (2.6.17.1-11.39) [6529b3249b30c826d8ab991d839c6cb4e952c1ed] 2.6.20-feisty-security: released (2.6.20-16.29)