Improper Verification of Cryptographic Signature Affecting firmware-nonfree package, versions <20190114-1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.46% (76th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-FIRMWARENONFREE-268101
  • published7 Aug 2018
  • disclosed7 Aug 2018

Introduced: 7 Aug 2018

CVE-2018-5383  (opens in a new tab)
CWE-347  (opens in a new tab)
CWE-325  (opens in a new tab)

How to fix?

Upgrade Debian:unstable firmware-nonfree to version 20190114-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream firmware-nonfree package and not the firmware-nonfree package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

Bluetooth firmware or operating system software drivers in macOS versions before 10.13, High Sierra and iOS versions before 11.4, and Android versions before the 2018-06-05 patch may not sufficiently validate elliptic curve parameters used to generate public keys during a Diffie-Hellman key exchange, which may allow a remote attacker to obtain the encryption key used by the device.