summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2007-1353
blob: 4016451a3d3cc2b4918d920d36a7b7d2ee56eb54 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
Candidate: CVE-2007-1353
References: 
 http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.34.3
 http://www.securityfocus.com/bid/23594
 http://www.frsirt.com/english/advisories/2007/1495
 http://secunia.com/advisories/24976 
Description: 
 The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux
 kernel before 2.4.34.3 allows context-dependent attackers to read kernel
 memory and obtain sensitive information via unspecified vectors involving the
 copy_from_user function accessing an uninitialized stack buffer.
Ubuntu-Description: 
 Ilja van Sprundel discovered that Bluetooth setsockopt calls could leak
 kernel memory contents via an uninitialized stack buffer.  A local 
 attacker could exploit this flaw to view sensitive kernel information.
Notes:  
 jmm> This was fixed in git on 2007-05-04, marking 2.6.22 as fixed version
Bugs: 
upstream: released (2.6.22)
linux-2.6: released (2.6.22-1)
2.6.18-etch-security: released (2.6.18.dfsg.1-13etch1) [bugfix/bluetooth-l2cap-hci-info-leaks.patch]
2.6.8-sarge-security: released (2.6.8-17sarge1) [bluetooth-l2cap-hci-info-leaks.dpatch]
2.4.27-sarge-security: released (2.4.27-10sarge6) [244_bluetooth-l2cap-hci-info-leaks.diff]
2.6.15-dapper-security: released (2.6.15-28.57)
2.6.17-edgy-security: released (2.6.17.1-11.39) [6529b3249b30c826d8ab991d839c6cb4e952c1ed]
2.6.20-feisty-security: released (2.6.20-16.29)

© 2014-2024 Faster IT GmbH | imprint | privacy policy