summaryrefslogtreecommitdiffstats
path: root/active/CVE-2020-15802
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2023-03-17 13:05:57 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2023-03-17 13:05:57 +0100
commitc0aa783b12cca88f4db87be7d883b51229202a94 (patch)
treeacec68c397e7c737288facd66f0d1cda94ef3856 /active/CVE-2020-15802
parentcd641c591a35c6d3092abf89a75976985d44a358 (diff)
Remove associations for CVE-2020-15802 and CVE-2020-26555
Following security-tracker update for the entries and de-association with specific implementation in Linux but rather considering it a protocol issue. Link: https://salsa.debian.org/security-tracker-team/security-tracker/commit/c72e05398d71b26af09299b3f90b540b44af3bb8
Diffstat (limited to 'active/CVE-2020-15802')
-rw-r--r--active/CVE-2020-1580219
1 files changed, 0 insertions, 19 deletions
diff --git a/active/CVE-2020-15802 b/active/CVE-2020-15802
deleted file mode 100644
index 975e823a..00000000
--- a/active/CVE-2020-15802
+++ /dev/null
@@ -1,19 +0,0 @@
-Description: BLURtooth: "Dual mode" hardware using CTKD are vulnerable to key overwrite
-References:
- https://bugzilla.redhat.com/show_bug.cgi?id=1878021
- https://securityaffairs.co/wordpress/108096/hacking/blurtooth-bluetooth-attack.html
- https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/blurtooth/
- https://www.kb.cert.org/vuls/id/589825/
- https://bugzilla.suse.com/show_bug.cgi?id=1176442
-Notes:
- bwh> Introduced in 3.19 as noted in
- bwh> http://www.bluez.org/bluetooth-4-2-features-going-to-the-3-19-kernel-release/
-Bugs:
-upstream: needed
-5.10-upstream-stable: needed
-4.19-upstream-stable: needed
-4.9-upstream-stable: needed
-sid: needed
-5.10-bullseye-security: needed
-4.19-buster-security: needed
-4.9-stretch-security: ignored "EOL"

© 2014-2024 Faster IT GmbH | imprint | privacy policy