Lucene search

K
debianDebianDEBIAN:DSA-4951-1:8308D
HistoryAug 07, 2021 - 6:51 p.m.

[SECURITY] [DSA 4951-1] bluez security update

2021-08-0718:51:55
lists.debian.org
31

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P


Debian Security Advisory DSA-4951-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
August 07, 2021 https://www.debian.org/security/faq


Package : bluez
CVE ID : CVE-2020-26558 CVE-2020-27153 CVE-2021-0129
Debian Bug : 989614

Several vulnerabilities were discovered in Bluez, the Linux Bluetooth
protocol stack.

CVE-2020-26558 / CVE-2021-0129

It was discovered that Bluez does not properly check permissions
during pairing operation, which could allow an attacker to
impersonate the initiating device.

CVE-2020-27153

Jay LV discovered a double free flaw in the disconnect_cb() routine
in the gattool. A remote attacker can take advantage of this flaw
during service discovery for denial of service, or potentially,
execution of arbitrary code.

For the stable distribution (buster), these problems have been fixed in
version 5.50-1.2~deb10u2.

We recommend that you upgrade your bluez packages.

For the detailed security status of bluez please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/bluez

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P