Vulnerability in Linux Kernel HCI sockets allows unauthorized execution of management commands compromising Bluetooth securit
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
OSV | Red Hat Security Advisory: kernel security update | 13 Sep 202421:21 | – | osv |
OSV | Red Hat Security Advisory: kernel security update | 13 Sep 202421:20 | – | osv |
OSV | Red Hat Security Advisory: kernel security and bug fix update | 13 Sep 202421:19 | – | osv |
OSV | Red Hat Security Advisory: kernel-rt security update | 13 Sep 202421:20 | – | osv |
OSV | Important: kernel security and bug fix update | 21 Jun 202300:00 | – | osv |
OSV | Red Hat Security Advisory: kernel security and bug fix update | 25 Sep 202417:35 | – | osv |
OSV | Red Hat Security Advisory: kernel-rt security and bug fix update | 25 Sep 202417:35 | – | osv |
OSV | Important: kernel-rt security and bug fix update | 21 Jun 202300:00 | – | osv |
OSV | Red Hat Security Advisory: kernel security and bug fix update | 25 Sep 202417:35 | – | osv |
OSV | Red Hat Security Advisory: kernel-rt security and bug fix update | 25 Sep 202417:36 | – | osv |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | 4.15.0-223.235 | UNKNOWN |
ubuntu | 20.04 | noarch | linux | 5.4.0-162.179 | UNKNOWN |
ubuntu | 22.04 | noarch | linux | 5.15.0-79.86 | UNKNOWN |
ubuntu | 23.04 | noarch | linux | 6.2.0-27.28 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | 4.15.0-1166.179 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | 5.4.0-1109.118 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | 5.15.0-1042.47 | UNKNOWN |
ubuntu | 23.04 | noarch | linux-aws | 6.2.0-1009.9 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | 5.15.0-1041.46~20.04.1 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | 5.4.0-1109.118~18.04.1 | UNKNOWN |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo