First published: Sun Mar 27 2005(Updated: )
The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 through 2.4.30-rc1 and 2.6 through 2.6.11.5 allows local users to gain privileges via (1) socket or (2) socketpair call with a negative protocol value.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Conectiva Linux | =10.0 | |
Linux Kernel | =2.4.6 | |
Linux Kernel | =2.4.7 | |
Linux Kernel | =2.4.8 | |
Linux Kernel | =2.4.9 | |
Linux Kernel | =2.4.10 | |
Linux Kernel | =2.4.11 | |
Linux Kernel | =2.4.12 | |
Linux Kernel | =2.4.13 | |
Linux Kernel | =2.4.14 | |
Linux Kernel | =2.4.15 | |
Linux Kernel | =2.4.16 | |
Linux Kernel | =2.4.17 | |
Linux Kernel | =2.4.18 | |
Linux Kernel | =2.4.19 | |
Linux Kernel | =2.4.20 | |
Linux Kernel | =2.4.21 | |
Linux Kernel | =2.4.22 | |
Linux Kernel | =2.4.23 | |
Linux Kernel | =2.4.24 | |
Linux Kernel | =2.4.25 | |
Linux Kernel | =2.4.26 | |
Linux Kernel | =2.4.27 | |
Linux Kernel | =2.4.28 | |
Linux Kernel | =2.4.29 | |
Linux Kernel | =2.6.0 | |
Linux Kernel | =2.6.1 | |
Linux Kernel | =2.6.2 | |
Linux Kernel | =2.6.3 | |
Linux Kernel | =2.6.4 | |
Linux Kernel | =2.6.5 | |
Linux Kernel | =2.6.6 | |
Linux Kernel | =2.6.7 | |
Linux Kernel | =2.6.8 | |
Linux Kernel | =2.6.9-2.6.20 | |
Linux Kernel | =2.6.10 | |
Linux Kernel | =2.6.11 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux Desktop | =4.0 | |
Red Hat Fedora Core | =core_1.0 | |
Red Hat Fedora Core | =core_2.0 | |
Red Hat Fedora Core | =core_3.0 | |
Red Hat Linux | =7.3 | |
Red Hat Linux | =7.3 | |
Red Hat Linux | =7.3 | |
Red Hat Linux | =9.0 | |
SUSE Linux | =1.0 | |
SUSE Linux | =9.3 | |
Ubuntu | =4.1 | |
Ubuntu | =4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0750 is a privilege escalation vulnerability that is considered to have a high severity due to potential exploitation by local users.
To mitigate CVE-2005-0750, users should upgrade to the patched versions of the Linux kernel that are unaffected by this vulnerability.
CVE-2005-0750 affects local users on systems running vulnerable versions of the Linux kernel, including 2.4.6 to 2.4.30 and 2.6 to 2.6.11.5.
Vulnerable systems include various distributions of the Linux kernel, including Conectiva Linux 10.0, Red Hat Enterprise Linux 4.0, and several versions of Ubuntu, SUSE, and Fedora.
An attacker exploiting CVE-2005-0750 can gain elevated privileges on a vulnerable system by using socket or socketpair calls with a negative protocol value.