The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.
Get an AI-powered plain-language explanation of this vulnerability and remediation steps.
Login to generate AI explanation62 reference(s) from NVD