VYPR

rpm package

suse/bluez&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP3

pkg:rpm/suse/bluez&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3

Vulnerabilities (11)

  • CVE-2020-0556Mar 12, 2020
    affected < 5.13-5.23.1fixed 5.13-5.23.1

    Improper access control in subsystem for BlueZ before version 5.54 may allow an unauthenticated user to potentially enable escalation of privilege and denial of service via adjacent access

  • CVE-2017-1000250MedSep 12, 2017
    affected < 5.13-5.4.1fixed 5.13-5.4.1

    All versions of the SDP server in BlueZ 5.46 and earlier are vulnerable to an information disclosure vulnerability which allows remote attackers to obtain sensitive information from the bluetoothd process memory. This vulnerability lies in the processing of SDP search attribute r

  • CVE-2016-7837HigJun 9, 2017
    affected < 5.13-5.4.1fixed 5.13-5.4.1

    Buffer overflow in BlueZ 5.41 and earlier allows an attacker to execute arbitrary code via the parse_line function used in some userland utilities.

  • CVE-2016-9918HigDec 8, 2016
    affected < 5.13-5.12.1fixed 5.13-5.12.1

    In BlueZ 5.42, an out-of-bounds read was identified in "packet_hexdump" function in "monitor/packet.c" source file. This issue can be triggered by processing a corrupted dump file and will result in btmon crash.

  • CVE-2016-9917HigDec 8, 2016
    affected < 5.13-5.12.1fixed 5.13-5.12.1

    In BlueZ 5.42, a buffer overflow was observed in "read_n" function in "tools/hcidump.c" source file. This issue can be triggered by processing a corrupted dump file and will result in hcidump crash.

  • CVE-2016-9804MedDec 3, 2016
    affected < 5.13-5.4.1fixed 5.13-5.4.1

    In BlueZ 5.42, a buffer overflow was observed in "commands_dump" function in "tools/parser/csr.c" source file. The issue exists because "commands" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame "frm->ptr" parameter. This

  • CVE-2016-9802MedDec 3, 2016
    affected < 5.13-5.12.1fixed 5.13-5.12.1

    In BlueZ 5.42, a buffer over-read was identified in "l2cap_packet" function in "monitor/packet.c" source file. This issue can be triggered by processing a corrupted dump file and will result in btmon crash.

  • CVE-2016-9801MedDec 3, 2016
    affected < 5.13-5.7.1fixed 5.13-5.7.1

    In BlueZ 5.42, a buffer overflow was observed in "set_ext_ctrl" function in "tools/parser/l2cap.c" source file when processing corrupted dump file.

  • CVE-2016-9800MedDec 3, 2016
    affected < 5.13-5.4.1fixed 5.13-5.4.1

    In BlueZ 5.42, a buffer overflow was observed in "pin_code_reply_dump" function in "tools/parser/hci.c" source file. The issue exists because "pin" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame "pin_code_reply_cp *cp" pa

  • CVE-2016-9798MedDec 3, 2016
    affected < 5.13-5.12.1fixed 5.13-5.12.1

    In BlueZ 5.42, a use-after-free was identified in "conf_opt" function in "tools/parser/l2cap.c" source file. This issue can be triggered by processing a corrupted dump file and will result in hcidump crash.

  • CVE-2016-9797MedDec 3, 2016
    affected < 5.13-5.12.1fixed 5.13-5.12.1

    In BlueZ 5.42, a buffer over-read was observed in "l2cap_dump" function in "tools/parser/l2cap.c" source file. This issue can be triggered by processing a corrupted dump file and will result in hcidump crash.