Gentoo Archives: gentoo-announce

From: Sam James <sam@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 202011-01 ] BlueZ: Arbitrary code execution
Date: Tue, 03 Nov 2020 00:55:48
Message-Id: 86043D1E-4522-43C7-AFE6-72E72BF9981F@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 202011-01
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: BlueZ: Arbitrary code execution
9 Date: November 03, 2020
10 Bugs: #749285
11 ID: 202011-01
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A vulnerability in BlueZ might allow remote attackers to execute
19 arbitrary code.
20
21 Background
22 ==========
23
24 Set of tools to manage Bluetooth devices for Linux.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 net-wireless/bluez < 5.55 >= 5.55
33
34 Description
35 ===========
36
37 It was discovered that there was a double-free vulnerability in Bluez
38 after the service discovery which occurs after a Bluetoth Low Energy
39 (BLE) connection has been established to a device.
40
41 Impact
42 ======
43
44 A remote attacker, by enticing a user to connect to a malicious GATT
45 server or device, could cause the execution of arbitrary code with the
46 privileges of the user running gatttool client or cause a Denial of
47 Service condition.
48
49 Workaround
50 ==========
51
52 There is no known workaround at this time.
53
54 Resolution
55 ==========
56
57 All BlueZ users should upgrade to the latest version:
58
59 # emerge --sync
60 # emerge --ask --oneshot --verbose ">=net-wireless/bluez-5.55"
61
62 References
63 ==========
64
65 [ 1 ] CVE-2020-27153
66 https://nvd.nist.gov/vuln/detail/CVE-2020-27153
67
68 Availability
69 ============
70
71 This GLSA and any updates to it are available for viewing at
72 the Gentoo Security Website:
73
74 https://security.gentoo.org/glsa/202011-01
75
76 Concerns?
77 =========
78
79 Security is a primary focus of Gentoo Linux and ensuring the
80 confidentiality and security of our users' machines is of utmost
81 importance to us. Any security concerns should be addressed to
82 security@g.o or alternatively, you may file a bug at
83 https://bugs.gentoo.org.
84
85 License
86 =======
87
88 Copyright 2020 Gentoo Foundation, Inc; referenced text
89 belongs to its owner(s).
90
91 The contents of this document are licensed under the
92 Creative Commons - Attribution / Share Alike license.
93
94 https://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature