Improper access control in subsystem for BlueZ before version 5.54 may allow an unauthenticated user to potentially enable escalation of privilege and denial of service via adjacent access
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 04:53
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00008.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00055.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/06/msg00008.html - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202003-49 - Third Party Advisory | |
References | () https://usn.ubuntu.com/4311-1/ - Third Party Advisory | |
References | () https://www.debian.org/security/2020/dsa-4647 - Third Party Advisory | |
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00352.html - Patch, Third Party Advisory |
Information
Published : 2020-03-12 21:15
Updated : 2024-11-21 04:53
NVD link : CVE-2020-0556
Mitre link : CVE-2020-0556
CVE.ORG link : CVE-2020-0556
JSON object : View
Products Affected
debian
- debian_linux
opensuse
- leap
bluez
- bluez
canonical
- ubuntu_linux
CWE