Bug 187945 (CVE-2006-0670)
| Summary: | CVE-2006-0670 bluez-hcidump Denial of Service | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Josh Bressers <bressers> | 
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | 
| Status: | CLOSED WONTFIX | QA Contact: | |
| Severity: | low | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | vdanen | 
| Target Milestone: | --- | Keywords: | Security | 
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2011-08-02 18:43:06 UTC | Type: | --- | 
| Regression: | --- | Mount Type: | --- | 
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| 
 
        
          Description
        
        
          Josh Bressers
        
        
        
        
        
          2006-04-04 20:01:26 UTC
        
       
      
      
      
    moving to security response bug. should we decide to fix this in a later update for rhel4 we'll create appropriate tracking bugs with flags at that time. This issue is corrected in bluez-hcidump 1.32 as provided by Red Hat Enterprise Linux 5, and does not affect Red Hat Enterprise Linux 3. The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw in Red Hat Enterprise Linux 4. The above link no longer works; this updated link does: http://bluez.cvs.sourceforge.net/viewvc/bluez/hcidump/parser/l2cap.c?r1=1.51&r2=1.52&view=patch Statement: Red Hat no longer plans to fix this issue in Red Hat Enterprise Linux 4. This issue is corrected in bluez-hcidump 1.32 as provided by Red Hat Enterprise Linux 5.  |