• [SECURITY] [DSA 4951-1] bluez security update

    From Salvatore Bonaccorso@21:1/5 to All on Sat Aug 7 21:00:02 2021
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA512

    - ------------------------------------------------------------------------- Debian Security Advisory DSA-4951-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso August 07, 2021 https://www.debian.org/security/faq
    - -------------------------------------------------------------------------

    Package : bluez
    CVE ID : CVE-2020-26558 CVE-2020-27153 CVE-2021-0129
    Debian Bug : 989614

    Several vulnerabilities were discovered in Bluez, the Linux Bluetooth
    protocol stack.

    CVE-2020-26558 / CVE-2021-0129

    It was discovered that Bluez does not properly check permissions
    during pairing operation, which could allow an attacker to
    impersonate the initiating device.

    CVE-2020-27153

    Jay LV discovered a double free flaw in the disconnect_cb() routine
    in the gattool. A remote attacker can take advantage of this flaw
    during service discovery for denial of service, or potentially,
    execution of arbitrary code.

    For the stable distribution (buster), these problems have been fixed in
    version 5.50-1.2~deb10u2.

    We recommend that you upgrade your bluez packages.

    For the detailed security status of bluez please refer to its security
    tracker page at:
    https://security-tracker.debian.org/tracker/bluez

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/

    Mailing list: debian-security-announce@lists.debian.org
    -----BEGIN PGP SIGNATURE-----

    iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmEO1iRfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0QF3xAAkSvKZRi8690yAgH6kahX0wdjgjw6bwEm4AIisUYPcnmTe+eXWo65amXD Gu5RDkjJdwZuiOhjYuEQp/g79f2jRna1gtYhTrErO4G/W2ma8GF/R0ligiDAeUka wrzk5bpY1eeCbyI/EmMSAZdxOYgjoPgsA6Dqj9aRAhfHIJskCBg08KDm3XxAG/ZK 2rZpv/tHw6JU4WcSsyefY1ocPiUe1vcqH7m/cjgpYfW+0YhE01/khdWibNVXpXkl wwULv2HTXBMPY5xJb++3qcCNve1YZwNSpnfqsaoxdWmRvFYoWZHt231dr3GHZmUn GZ5h7Aaf7Ej7WtQ3TwIXNL5j46ibynxIL277Xqf3Ro1w/7qS0upY2NjkFCy4D24K slWJwm2+pWxrXypNnVNTVO7iWmM498MBaA7qQjtQyrFMulv9nY6WlVIxoVmQwUww mbDO/Lmghmwn7Y8cw9oWZ1+NpQg7wcsdDf0nfz59yAsiJoRoPv7ukXimYedL1lLJ ANS0M+ZQgKy1q9qKknD4LIHAZm6vN62/bU2WWLNErlB5mVuRxsEGuSb3Q1DwQzju akUX8tJemcOLif1aXRjut6isjr5w1lSj4WM4vNlFt/ncADwaWlLV/FzFnyViiw1v AlcVMh2v2aCa6kz1vTY+GCTq+qaBjzqvzeK/raepFbDgEzrIQQI=
    =Xh4j
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)