Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.
References
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 05:42
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html - Mailing List, Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html - Mailing List, Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html - Mailing List, Third Party Advisory | |
| References | () https://security.gentoo.org/glsa/202209-16 - Third Party Advisory | |
| References | () https://security.netapp.com/advisory/ntap-20210716-0002/ - Third Party Advisory | |
| References | () https://www.debian.org/security/2021/dsa-4951 - Third Party Advisory | |
| References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html - Vendor Advisory |
12 Jul 2022, 17:42
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | NVD-CWE-Other |
29 Nov 2021, 17:59
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:* |
14 Sep 2021, 14:34
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | (MLIST) https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html - Mailing List, Third Party Advisory | |
| References | (MLIST) https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html - Mailing List, Third Party Advisory | |
| References | (CONFIRM) https://security.netapp.com/advisory/ntap-20210716-0002/ - Third Party Advisory | |
| References | (MLIST) https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html - Mailing List, Third Party Advisory | |
| CPE | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* |
07 Aug 2021, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
16 Jul 2021, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
23 Jun 2021, 02:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Jun 2021, 17:33
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MISC) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html - Vendor Advisory | |
| CWE | CWE-863 | |
| CVSS |
v2 : v3 : |
v2 : 2.7
v3 : 5.7 |
| CPE | cpe:2.3:a:bluez:bluez:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
09 Jun 2021, 20:19
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2021-06-09 20:15
Updated : 2024-11-21 05:42
NVD link : CVE-2021-0129
Mitre link : CVE-2021-0129
CVE.ORG link : CVE-2021-0129
JSON object : View
Products Affected
redhat
- enterprise_linux
debian
- debian_linux
bluez
- bluez
linux
- linux_kernel
CWE
