[SECURITY] [DLA 3879-1] bluez security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3879-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Adrian Bunk
September 07, 2024 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : bluez
Version : 5.55-3.1+deb11u2
CVE ID : CVE-2021-3658 CVE-2021-41229 CVE-2021-43400 CVE-2022-0204
CVE-2022-39176 CVE-2022-39177 CVE-2023-27349 CVE-2023-50229
CVE-2023-50230
Debian Bug : 991596 998626 1000262 1003712
Multiple vulnerabilities have been fixed in bluez library, tools and
daemons for using Bluetooth devices.
CVE-2021-3658
adapter: Fix storing discoverable setting
CVE-2021-41229
Memory leak in the SDP protocol
CVE-2021-43400
Use-after-free on client disconnect
CVE-2022-0204
GATT heap overflow
CVE-2022-39176
Proximate attackers could obtain sensitive information
CVE-2022-39177
Proximate attackers could cause denial of service
CVE-2023-27349
AVRCP crash while handling unsupported events
CVE-2023-50229
Phone Book Access profile Heap-based Buffer Overflow
CVE-2023-50230
Phone Book Access profile Heap-based Buffer Overflow
For Debian 11 bullseye, these problems have been fixed in version
5.55-3.1+deb11u2.
We recommend that you upgrade your bluez packages.
For the detailed security status of bluez please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/bluez
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAmbcXJkACgkQiNJCh6LY
mLG/zw//fTdYYtZn5I1lBEa1gtj4NMZmhW3tXIWFrknsn6bCgI7Wqn1GsWsIPWBU
SEYm/LWaHP+Yv1DFjSgN21yZ9t6WtpdhWmhIJaa3gwWlzxSKvdWXqCgKcbcxyrAS
QeglEZ5EMb1UY/48vbYtTM6v7TFFgratGAEU0tvYdeAXYl4WjnhBXwrNrZt+LEu6
yjsHeAj8Z4PnHhlWVTmnxkYDdM8/WKT/bCHKmICHmdZHTd1488M+jA6NE/3jgABH
JvR4SdnIBUnPQAqr895MuiejvU7VTP3yh3ov+MqK8WdSNInpJwp6G9JCdG7NG4ns
2TmquTgmsjARE9vJO87oyH1DTfdMgSrsBE4Dse9PJLAsovjncWuACOj1u5RqAp5q
z1jtt4VSQ3qTE+bPYwYkCthPf8xS2/UxXeu95l2STTI89rpXApUrHlmVXcV7wCuc
RbK6IXHKJMaANzcA2YiijR8v2AcHCIeDRrPRQK8dg8cXA9EoHe9jkJV7eFQwcdnQ
RNPIQnGx55nG16784dUxyCeerWXcc/3d7S8tyR/ek8rMIwnKQbnf2TJhejB4M/0d
uyuRxGOslvcskeYDSytQV9Y/322+TByXKAWT5sBnOvskPpTtQe1OlTpNPfRdYpN4
z5Nsmh5DOUrDXGPabLGm/8k32SiKHX8Ob2LVlp/jseOhWkMsCDY=
=mC+z
-----END PGP SIGNATURE-----
Reply to: