Description
The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 through 2.4.30-rc1 and 2.6 through 2.6.11.5 allows local users to gain privileges via (1) socket or (2) socketpair call with a negative protocol value.
Product(s):
- Conectiva Linux 10.0
- Linux Kernel 2.4.10
- Linux Kernel 2.4.11
- Linux Kernel 2.4.11 pre3
- Linux Kernel 2.4.12
- Linux Kernel 2.4.13
- Linux Kernel 2.4.14
- Linux Kernel 2.4.15
- Linux Kernel 2.4.16
- Linux Kernel 2.4.17
- Linux Kernel 2.4.18
- Linux Kernel 2.4.18 pre1
- Linux Kernel 2.4.18 pre2
- Linux Kernel 2.4.18 pre3
- Linux Kernel 2.4.18 pre4
- Linux Kernel 2.4.18 pre5
- Linux Kernel 2.4.18 pre6
- Linux Kernel 2.4.18 pre7
- Linux Kernel 2.4.18 pre8
- Linux Kernel 2.4.18 pre9
- Linux Kernel 2.4.19
- Linux Kernel 2.4.19 pre1
- Linux Kernel 2.4.19 pre2
- Linux Kernel 2.4.19 pre3
- Linux Kernel 2.4.19 pre4
- Linux Kernel 2.4.19 pre5
- Linux Kernel 2.4.19 pre6
- Linux Kernel 2.4.20
- Linux Kernel 2.4.21
- Linux Kernel 2.4.21 pre1
- Linux Kernel 2.4.21 pre4
- Linux Kernel 2.4.21 pre7
- Linux Kernel 2.4.22
- Linux Kernel 2.4.22 pre10
- Linux Kernel 2.4.23
- Linux Kernel 2.4.23 pre9
- Linux Kernel 2.4.24
- Linux Kernel 2.4.25
- Linux Kernel 2.4.26
- Linux Kernel 2.4.27
- Linux Kernel 2.4.27 pre1
- Linux Kernel 2.4.27 pre2
- Linux Kernel 2.4.27 pre3
- Linux Kernel 2.4.27 pre4
- Linux Kernel 2.4.27 pre5
- Linux Kernel 2.4.28
- Linux Kernel 2.4.29
- Linux Kernel 2.4.29 rc1
- Linux Kernel 2.4.29 rc2
- Linux Kernel 2.4.6
- Linux Kernel 2.4.7
- Linux Kernel 2.4.8
- Linux Kernel 2.4.9
- Linux Kernel 2.6.0
- Linux Kernel 2.6 test10
- Linux Kernel 2.6 test11
- Linux Kernel 2.6 test1
- Linux Kernel 2.6 test2
- Linux Kernel 2.6 test3
- Linux Kernel 2.6 test4
- Linux Kernel 2.6 test5
- Linux Kernel 2.6 test6
- Linux Kernel 2.6 test7
- Linux Kernel 2.6 test8
- Linux Kernel 2.6 test9
- Linux Kernel 2.6.10
- Linux Kernel 2.6.10 Release Candidate 1
- Linux Kernel 2.6.10 Release Candidate 2
- Linux Kernel 2.6.10 Release Candidate 3
- Linux Kernel 2.6.11
- Linux Kernel 2.6.11 Release Candidate 1
- Linux Kernel 2.6.11 Release Candidate 2
- Linux Kernel 2.6.11 Release Candidate 3
- Linux Kernel 2.6.11 Release Candidate 4
- Linux Kernel 2.6.11 Release Candidate 5
- Linux Kernel 2.6.1
- Linux Kernel 2.6.1 Release Candidate 1
- Linux Kernel 2.6.1 Release Candidate 2
- Linux Kernel 2.6.1 Release Candidate 3
- Linux Kernel 2.6.2
- Linux Kernel 2.6.2 Release Candidate 1
- Linux Kernel 2.6.2 Release Candidate 2
- Linux Kernel 2.6.2 Release Candidate 3
- Linux Kernel 2.6.3
- Linux Kernel 2.6.3 Release Candidate 1
- Linux Kernel 2.6.3 Release Candidate 2
- +43 additional
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2005-0750, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2005-0750 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.