summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2021-0129
diff options
context:
space:
mode:
authorBen Hutchings <ben@decadent.org.uk>2021-06-22 00:18:55 +0200
committerBen Hutchings <ben@decadent.org.uk>2021-06-22 00:18:55 +0200
commitc5514b94af9266aad627312df336b975eedd67f8 (patch)
treea08140070dd99e823d3fe800431162ed2de02841 /retired/CVE-2021-0129
parent82acbf4e2b302b3077bc09cc21d465afe762d540 (diff)
Retire inactive issues
Diffstat (limited to 'retired/CVE-2021-0129')
-rw-r--r--retired/CVE-2021-012912
1 files changed, 12 insertions, 0 deletions
diff --git a/retired/CVE-2021-0129 b/retired/CVE-2021-0129
new file mode 100644
index 00000000..c75700f4
--- /dev/null
+++ b/retired/CVE-2021-0129
@@ -0,0 +1,12 @@
+Description: Passkey Entry protocol of the Bluetooth Core is vulnerable to an impersonation attack
+References:
+ https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html
+Notes:
+Bugs:
+upstream: released (5.13-rc1) [6d19628f539fccf899298ff02ee4c73e4bf6df3f]
+5.10-upstream-stable: released (5.10.40) [d8d261c7cfb3a5dd921b4aeeb944718afc3f3961]
+4.19-upstream-stable: released (4.19.192) [30126d4ba73119565f1748b116b9869ac6bbda6b]
+4.9-upstream-stable: released (4.9.270) [6555a006b21ab49090b9a7b36e92d0421db19328]
+sid: released (5.10.40-1)
+4.19-buster-security: released (4.19.194-1)
+4.9-stretch-security: released (4.9.272-1)

© 2014-2024 Faster IT GmbH | imprint | privacy policy