DEBIAN-CVE-2020-0556

Source
https://security-tracker.debian.org/tracker/CVE-2020-0556
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2020-0556.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2020-0556
Upstream
Published
2020-03-12T21:15:14Z
Modified
2025-09-19T06:08:15Z
Summary
[none]
Details

Improper access control in subsystem for BlueZ before version 5.54 may allow an unauthenticated user to potentially enable escalation of privilege and denial of service via adjacent access

References

Affected packages

Debian:11 / bluez

Package

Name
bluez
Purl
pkg:deb/debian/bluez?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.50-1.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / bluez

Package

Name
bluez
Purl
pkg:deb/debian/bluez?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.50-1.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / bluez

Package

Name
bluez
Purl
pkg:deb/debian/bluez?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.50-1.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / bluez

Package

Name
bluez
Purl
pkg:deb/debian/bluez?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.50-1.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}