Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2021-4432

Опубликовано: 24 нояб. 2021
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2021-4432: bluez security update (MODERATE)

[5.56-1]

  • bluez-5.56-1
  • Fixing (#1965057)
  • Removing bccmd, enabling hid2hci as upstream removed the support in bluez-5.56

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

bluez

5.56-1.el8

bluez-cups

5.56-1.el8

bluez-hid2hci

5.56-1.el8

bluez-libs

5.56-1.el8

bluez-libs-devel

5.56-1.el8

bluez-obexd

5.56-1.el8

Oracle Linux x86_64

bluez

5.56-1.el8

bluez-cups

5.56-1.el8

bluez-hid2hci

5.56-1.el8

bluez-libs

5.56-1.el8

bluez-libs-devel

5.56-1.el8

bluez-obexd

5.56-1.el8

Связанные CVE

Связанные уязвимости

CVSS3: 4.2
ubuntu
больше 4 лет назад

Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.

CVSS3: 4.2
redhat
больше 4 лет назад

Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.

CVSS3: 4.2
nvd
больше 4 лет назад

Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.

CVSS3: 4.2
msrc
почти 4 года назад

Описание отсутствует

CVSS3: 4.2
debian
больше 4 лет назад

Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification ...