CVE-2016-7837

Priority
Description
Buffer overflow in BlueZ 5.41 and earlier allows an attacker to execute
arbitrary code via the parse_line function used in some userland utilities.
Assigned-to
mdeslaur
Notes
Package
Source: bluez (LP Ubuntu Debian)
Upstream:released (5.43-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needs-triage)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was released [4.101-0ubuntu13.3])
Ubuntu 16.04 LTS (Xenial Xerus):released (5.37-0ubuntu5.3)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (5.43-0ubuntu1)
Ubuntu 19.10 (Eoan Ermine):not-affected (5.43-0ubuntu1)
Ubuntu 20.04 (Focal Fossa):not-affected (5.43-0ubuntu1)
Patches:
Upstream:http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=8514068150759c1d6a46d4605d2351babfde1601 (5.42)
More Information

Updated: 2020-03-30 20:14:55 UTC (commit 6d6b63f26ef5408c3a5fa4857eb2c093ed97703b)