diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2023-03-17 13:05:57 +0100 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2023-03-17 13:05:57 +0100 |
commit | c0aa783b12cca88f4db87be7d883b51229202a94 (patch) | |
tree | acec68c397e7c737288facd66f0d1cda94ef3856 /active/CVE-2020-15802 | |
parent | cd641c591a35c6d3092abf89a75976985d44a358 (diff) |
Remove associations for CVE-2020-15802 and CVE-2020-26555
Following security-tracker update for the entries and de-association
with specific implementation in Linux but rather considering it a
protocol issue.
Link: https://salsa.debian.org/security-tracker-team/security-tracker/commit/c72e05398d71b26af09299b3f90b540b44af3bb8
Diffstat (limited to 'active/CVE-2020-15802')
-rw-r--r-- | active/CVE-2020-15802 | 19 |
1 files changed, 0 insertions, 19 deletions
diff --git a/active/CVE-2020-15802 b/active/CVE-2020-15802 deleted file mode 100644 index 975e823a..00000000 --- a/active/CVE-2020-15802 +++ /dev/null @@ -1,19 +0,0 @@ -Description: BLURtooth: "Dual mode" hardware using CTKD are vulnerable to key overwrite -References: - https://bugzilla.redhat.com/show_bug.cgi?id=1878021 - https://securityaffairs.co/wordpress/108096/hacking/blurtooth-bluetooth-attack.html - https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/blurtooth/ - https://www.kb.cert.org/vuls/id/589825/ - https://bugzilla.suse.com/show_bug.cgi?id=1176442 -Notes: - bwh> Introduced in 3.19 as noted in - bwh> http://www.bluez.org/bluetooth-4-2-features-going-to-the-3-19-kernel-release/ -Bugs: -upstream: needed -5.10-upstream-stable: needed -4.19-upstream-stable: needed -4.9-upstream-stable: needed -sid: needed -5.10-bullseye-security: needed -4.19-buster-security: needed -4.9-stretch-security: ignored "EOL" |