6.8 Medium
CVSS3
Attack Vector
ADJACENT_NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
4.3 Medium
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:A/AC:M/Au:N/C:P/I:P/A:N
kernel is vulnerable to information disclosure. The vulnerability exists as the Bluetooth implementations may not sufficiently validate elliptic curve parameters during Diffie-Hellman key exchange.
www.cs.technion.ac.il/~biham/BT/
www.securityfocus.com/bid/104879
www.securitytracker.com/id/1041432
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.7_release_notes/index
access.redhat.com/errata/RHSA-2019:2169
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=1654809
bugzilla.redhat.com/show_bug.cgi?id=1671610
bugzilla.redhat.com/show_bug.cgi?id=1698960
bugzilla.redhat.com/show_bug.cgi?id=1702330
lists.debian.org/debian-lts-announce/2019/04/msg00005.html
usn.ubuntu.com/4094-1/
usn.ubuntu.com/4095-1/
usn.ubuntu.com/4095-2/
usn.ubuntu.com/4118-1/
www.bluetooth.com/news/unknown/2018/07/bluetooth-sig-security-update
www.kb.cert.org/vuls/id/304725
6.8 Medium
CVSS3
Attack Vector
ADJACENT_NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
4.3 Medium
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:A/AC:M/Au:N/C:P/I:P/A:N