Package "libbluetooth-dev"
Name: |
libbluetooth-dev
|
Description: |
Development files for using the BlueZ Linux Bluetooth library
|
Latest version: |
5.53-0ubuntu3.9 |
Release: |
focal (20.04) |
Level: |
security |
Repository: |
main |
Head package: |
bluez |
Homepage: |
http://www.bluez.org |
Links
Download "libbluetooth-dev"
Other versions of "libbluetooth-dev" in Focal
Changelog
bluez (5.53-0ubuntu3.4) focal-security; urgency=medium
* SECURITY UPDATE: incorrect discoverable status
- debian/patches/CVE-2021-3658.patch: fix storing discoverable setting
in src/adapter.c.
- CVE-2021-3658
* SECURITY UPDATE: DoS via memory leak in sdp_cstate_alloc_buf
- debian/patches/CVE-2021-41229.patch: fix leaking buffers stored in
cstates cache in src/sdpd-request.c, src/sdpd-server.c, src/sdpd.h,
unit/test-sdp.c.
- CVE-2021-41229
* SECURITY UPDATE: use-after-free when client disconnects
- debian/patches/CVE-2021-43400-pre1.patch: fix Acquire* reply handling
in src/gatt-database.c.
- debian/patches/CVE-2021-43400-pre2.patch: no multiple calls to
AcquireWrite in src/gatt-database.c.
- debian/patches/CVE-2021-43400.patch: fix not cleaning up when
disconnected in src/gatt-database.c.
- CVE-2021-43400
-- Marc Deslauriers <email address hidden> Wed, 17 Nov 2021 10:19:15 -0500
|
Source diff to previous version |
CVE-2021-41229 |
BlueZ is a Bluetooth protocol stack for Linux. In affected versions a vulnerability exists in sdp_cstate_alloc_buf which allocates memory which will |
CVE-2021-43400 |
An issue was discovered in gatt-database.c in BlueZ 5.61. A use-after-free can occur when a client disconnects during D-Bus processing of a WriteValu |
|
bluez (5.53-0ubuntu3.2) focal-security; urgency=medium
* SECURITY UPDATE: secure pairing passkey brute force
- debian/patches/CVE-2020-26558.patch: fix not properly checking for
secure flags in src/shared/att-types.h, src/shared/gatt-server.c.
- CVE-2020-26558
* SECURITY UPDATE: DoS or code execution via double-free
- debian/patches/CVE-2020-27153.patch: fix possible crash on disconnect
in src/shared/att.c.
- CVE-2020-27153
* SECURITY UPDATE: info disclosure via out of bounds read
- debian/patches/CVE-2021-3588.patch: when client features is read
check if the offset is within the cli_feat bounds in
src/gatt-database.c.
- CVE-2021-3588
-- Marc Deslauriers <email address hidden> Wed, 09 Jun 2021 11:06:38 -0400
|
CVE-2020-26558 |
Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the |
CVE-2020-27153 |
In BlueZ before 5.55, a double free was found in the gatttool disconnect_cb() routine from shared/att.c. A remote attacker could potentially cause a |
CVE-2021-3588 |
The cli_feat_read_cb() function in src/gatt-database.c does not perform bounds checks on the 'offset' variable before using it as an index into an ar |
|
About
-
Send Feedback to @ubuntu_updates