|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2016-9800: bluez,bluez-hcidump: buffer overflow in pin_code_reply_dump() | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Matthias Gerstner <matthias.gerstner> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Minor | ||
| Priority: | P3 - Medium | CC: | abergmann, seife, smash_bz |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | https://smash.suse.de/issue/177093/ | ||
| Whiteboard: | CVSSv2:RedHat:CVE-2016-9800:1.2:(AV:L/AC:H/Au:N/C:N/I:N/A:P) CVSSv2:SUSE:CVE-2016-9800:4.0:(AV:L/AC:H/Au:N/C:N/I:N/A:C) CVSSv2:NVD:CVE-2016-9800:5.0:(AV:N/AC:L/Au:N/C:N/I:N/A:P) CVSSv3:NVD:CVE-2016-9800:5.3:(AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) CVSSv3:RedHat:CVE-2016-9800:2.5:(AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L) | ||
| Found By: | Security Response Team | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Attachments: | dump file to reproduce the issue | ||
|
Description
Matthias Gerstner
2016-12-05 17:01:12 UTC
Created attachment 704875 [details]
dump file to reproduce the issue
SLE-12* is affected. bluez-hcidump from SLE-11-SP1:Update contains the exact same code but I could not reproduce the issue. I'm not sure why. QA reproducer: Using the attached dump file and the following command: hcidump -a -r CVE-2016-9800 the program terminated with a libc dump "buffer overflow detected" on SLES-12-SP2. bugbot adjusting priority This is not yet in newly released version bluez-5.50. Has this ever been communicated to bluez upstream? (In reply to Stefan Seyfried from comment #10) > This is not yet in newly released version bluez-5.50. > > Has this ever been communicated to bluez upstream? Yes, I did, but bluez upstream also ask us consider using btmon over hcidump, hcidump is a deprecated tool that they might remove at some point. Ok, thanks. I'm just always trying to reduce the number of patches when integrating a new upstream release (and have e.g. pushed 0001-obexd-use-AM_LDFLAGS-for-linking.patch again :-) Will just add a note in bluez.spec that we will keep them as downstream patches. SUSE-SU-2018:1778-1: An update that fixes four vulnerabilities is now available. Category: security (moderate) Bug References: 1013721,1013877,1026652,1057342 CVE References: CVE-2016-7837,CVE-2016-9800,CVE-2016-9804,CVE-2017-1000250 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP3 (src): bluez-5.13-5.4.1 SUSE Linux Enterprise Software Development Kit 12-SP3 (src): bluez-5.13-5.4.1 SUSE Linux Enterprise Server 12-SP3 (src): bluez-5.13-5.4.1 SUSE Linux Enterprise Desktop 12-SP3 (src): bluez-5.13-5.4.1 SUSE-SU-2018:4188-1: An update that fixes two vulnerabilities is now available. Category: security (moderate) Bug References: 1013721,1013732 CVE References: CVE-2016-9800,CVE-2016-9801 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP4 (src): bluez-5.13-5.7.1 SUSE Linux Enterprise Workstation Extension 12-SP3 (src): bluez-5.13-5.7.1 SUSE Linux Enterprise Software Development Kit 12-SP4 (src): bluez-5.13-5.7.1 SUSE Linux Enterprise Software Development Kit 12-SP3 (src): bluez-5.13-5.7.1 SUSE Linux Enterprise Server 12-SP4 (src): bluez-5.13-5.7.1 SUSE Linux Enterprise Server 12-SP3 (src): bluez-5.13-5.7.1 SUSE Linux Enterprise Desktop 12-SP4 (src): bluez-5.13-5.7.1 SUSE Linux Enterprise Desktop 12-SP3 (src): bluez-5.13-5.7.1 SUSE-SU-2018:4189-1: An update that fixes two vulnerabilities is now available. Category: security (moderate) Bug References: 1013721,1013732 CVE References: CVE-2016-9800,CVE-2016-9801 Sources used: SUSE Linux Enterprise Workstation Extension 15 (src): bluez-5.48-5.8.1 SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (src): bluez-5.48-5.8.1 SUSE Linux Enterprise Module for Desktop Applications 15 (src): bluez-5.48-5.8.1 SUSE Linux Enterprise Module for Basesystem 15 (src): bluez-5.48-5.8.1 openSUSE-SU-2018:4259-1: An update that fixes two vulnerabilities is now available. Category: security (moderate) Bug References: 1013721,1013732 CVE References: CVE-2016-9800,CVE-2016-9801 Sources used: openSUSE Leap 15.0 (src): bluez-5.48-lp150.4.6.1 SUSE-SU-2019:0510-1: An update that fixes 6 vulnerabilities is now available. Category: security (moderate) Bug References: 1013721,1013732,1013877,1015173,1026652,1057342 CVE References: CVE-2016-7837,CVE-2016-9800,CVE-2016-9801,CVE-2016-9804,CVE-2016-9918,CVE-2017-1000250 Sources used: SUSE Linux Enterprise Server for SAP 12-SP1 (src): bluez-5.13-3.10.1 SUSE Linux Enterprise Server 12-SP1-LTSS (src): bluez-5.13-3.10.1 SUSE Linux Enterprise Server 12-LTSS (src): bluez-5.13-3.10.1 Fixed and released. |