Insufficient permission check in Linux Bluetooth subsystem enables unauthorized execution of management commands. Exploit uses setuid programs to acquire trusted sockets.
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | Design/Logic Flaw | 27 Apr 201400:55 | – | prion |
![]() | Information disclosure | 26 May 202317:15 | – | prion |
![]() | RHSA-2014:1959 Red Hat Security Advisory: kernel security and bug fix update | 13 Sep 202408:55 | – | osv |
![]() | RHSA-2024:4098 Red Hat Security Advisory: kernel security update | 13 Sep 202421:21 | – | osv |
![]() | RHSA-2014:1023 Red Hat Security Advisory: kernel security and bug fix update | 15 Sep 202421:51 | – | osv |
![]() | RHSA-2024:1746 Red Hat Security Advisory: kernel security update | 13 Sep 202421:20 | – | osv |
![]() | RHSA-2024:2003 Red Hat Security Advisory: kernel-rt security update | 13 Sep 202421:20 | – | osv |
![]() | RHSA-2024:2004 Red Hat Security Advisory: kernel security and bug fix update | 13 Sep 202421:19 | – | osv |
![]() | RHSA-2014:0913 Red Hat Security Advisory: kernel-rt security update | 13 Sep 202409:18 | – | osv |
![]() | Important: kernel-rt security and bug fix update | 21 Jun 202300:00 | – | osv |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo