Hide Forgot
A buffer overflow was found in the pin_code_reply_dump() function in tools/parser/hci.c source file of bluez. The issue exists because pin array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame pin_code_reply_cp *cp parameter. Original report: https://www.spinics.net/lists/linux-bluetooth/msg68892.html
Created bluez-hcidump tracking bugs for this issue: Affects: fedora-all [bug 1401549]