CVE-2021-0129

Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:bluez:bluez:*:*:*:*:*:*:*:*
OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:42

Type Values Removed Values Added
References () https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html - Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/202209-16 - Third Party Advisory () https://security.gentoo.org/glsa/202209-16 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20210716-0002/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20210716-0002/ - Third Party Advisory
References () https://www.debian.org/security/2021/dsa-4951 - Third Party Advisory () https://www.debian.org/security/2021/dsa-4951 - Third Party Advisory
References () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html - Vendor Advisory () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html - Vendor Advisory

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-863 NVD-CWE-Other

29 Nov 2021, 17:59

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*

14 Sep 2021, 14:34

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
References
  • (DEBIAN) https://www.debian.org/security/2021/dsa-4951 - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html - (MLIST) https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html - Mailing List, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html - (MLIST) https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html - Mailing List, Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20210716-0002/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20210716-0002/ - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html - (MLIST) https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html - Mailing List, Third Party Advisory

07 Aug 2021, 23:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20210716-0002/ -

16 Jul 2021, 11:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html -

23 Jun 2021, 02:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html -
  • (MLIST) https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html -

21 Jun 2021, 17:33

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 2.7
v3 : 5.7
CWE CWE-863
References (MISC) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html - (MISC) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html - Vendor Advisory
CPE cpe:2.3:a:bluez:bluez:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

09 Jun 2021, 20:19

Type Values Removed Values Added
New CVE

Information

Published : 2021-06-09 20:15

Updated : 2024-11-21 05:42


NVD link : CVE-2021-0129

Mitre link : CVE-2021-0129

CVE.ORG link : CVE-2021-0129


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel

bluez

  • bluez

redhat

  • enterprise_linux