Red Hat Bugzilla – Bug 1401527
CVE-2016-9800 bluez: buffer overflow in pin_code_reply_dump()
Last modified: 2016-12-05 09:40:45 EST
A buffer overflow was found in the pin_code_reply_dump() function in tools/parser/hci.c source file of bluez. The issue exists because pin array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame pin_code_reply_cp *cp parameter. Original report: https://www.spinics.net/lists/linux-bluetooth/msg68892.html
Created bluez-hcidump tracking bugs for this issue: Affects: fedora-all [bug 1401549]