- EPSS 0.17%
- Veröffentlicht 10.07.2023 16:15:49
- Zuletzt bearbeitet 21.11.2024 07:40:06
The bluetooth HCI host layer logic not clearing a global reference to a state pointer after handling connection events may allow a malicious HCI Controller to cause the use of a dangling reference in the host layer, leading to a crash (DoS) or potent...
CVE-2023-0359
- EPSS 0.23%
- Veröffentlicht 10.07.2023 16:15:48
- Zuletzt bearbeitet 21.11.2024 07:37:02
A missing nullptr-check in handle_ra_input can cause a nullptr-deref.
CVE-2023-0779
- EPSS 0.21%
- Veröffentlicht 30.05.2023 21:15:08
- Zuletzt bearbeitet 21.11.2024 07:37:48
At the most basic level, an invalid pointer can be input that crashes the device, but with more knowledge of the device’s memory layout, further exploitation is possible.
CVE-2021-3329
- EPSS 0.05%
- Veröffentlicht 26.02.2023 07:15:10
- Zuletzt bearbeitet 21.11.2024 06:21:18
Lack of proper validation in HCI Host stack initialization can cause a crash of the bluetooth stack
CVE-2023-0396
- EPSS 0.05%
- Veröffentlicht 25.01.2023 02:02:06
- Zuletzt bearbeitet 03.04.2025 20:15:20
A malicious / defective bluetooth controller can cause buffer overreads in the most functions that process HCI command responses.
CVE-2022-3806
- EPSS 0.1%
- Veröffentlicht 25.01.2023 02:01:19
- Zuletzt bearbeitet 03.04.2025 20:15:17
Inconsistent handling of error cases in bluetooth hci may lead to a double free condition of a network buffer.
CVE-2023-0397
- EPSS 0.03%
- Veröffentlicht 19.01.2023 06:15:09
- Zuletzt bearbeitet 21.11.2024 07:37:06
A malicious / defect bluetooth controller can cause a Denial of Service due to unchecked input in le_read_buffer_size_complete.
CVE-2021-3966
- EPSS 0.06%
- Veröffentlicht 11.01.2023 05:15:10
- Zuletzt bearbeitet 21.11.2024 06:23:15
usb device bluetooth class includes a buffer overflow related to implementation of net_buf_add_mem.
CVE-2022-0553
- EPSS 0.02%
- Veröffentlicht 11.01.2023 04:15:10
- Zuletzt bearbeitet 21.11.2024 06:38:54
There is no check to see if slot 0 is being uploaded from the device to the host. When using encrypted images this means the unencrypted firmware can be retrieved easily.
CVE-2022-2993
- EPSS 0.14%
- Veröffentlicht 09.12.2022 20:15:10
- Zuletzt bearbeitet 22.04.2025 18:15:49
There is an error in the condition of the last if-statement in the function smp_check_keys. It was rejecting current keys if all requirements were unmet.