drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in BlueZ
Name: |
Mehrere Probleme in BlueZ |
|
ID: |
USN-5155-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 21.04, Ubuntu 21.10 |
|
Datum: |
Di, 23. November 2021, 22:24 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3658
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43400 |
|
Applikationen: |
BlueZ |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============1904988286252749911== Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="Qh4FG22nG4qOS7pP7f7YQl0dZG39Z8xLK"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --Qh4FG22nG4qOS7pP7f7YQl0dZG39Z8xLK Content-Type: multipart/mixed; boundary="1KfRin9pp3hEOJQycsCm9b3IQJ6nlkWcK"; protected-headers="v1" From: Marc Deslauriers <marc.deslauriers@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: "ubuntu-security-announce@lists.ubuntu.com" <ubuntu-security-announce@lists.ubuntu.com> Message-ID: <98d1fe38-f010-f7f3-7479-8b6a52312903@canonical.com> Subject: [USN-5155-1] BlueZ vulnerabilities
--1KfRin9pp3hEOJQycsCm9b3IQJ6nlkWcK Content-Type: text/plain; charset=utf-8 Content-Language: en-C Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-5155-1 November 23, 2021
bluez vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 21.10 - Ubuntu 21.04 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in BlueZ.
Software Description: - bluez: Bluetooth tools and daemons
Details:
It was discovered that BlueZ incorrectly handled the Discoverable status when a device is powered down. This could result in devices being powered up discoverable, contrary to expectations. This issue only affected Ubuntu 20.04 LTS, Ubuntu 21.04, and Ubuntu 21.10. (CVE-2021-3658)
It was discovered that BlueZ incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause BlueZ to consume resources, leading to a denial of service. (CVE-2021-41229)
It was discovered that the BlueZ gatt server incorrectly handled disconnects. A remote attacker could possibly use this issue to cause BlueZ to crash, leading to a denial of service. (CVE-2021-43400)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 21.10: bluez 5.60-0ubuntu2.1 libbluetooth3 5.60-0ubuntu2.1
Ubuntu 21.04: bluez 5.56-0ubuntu4.3 libbluetooth3 5.56-0ubuntu4.3
Ubuntu 20.04 LTS: bluez 5.53-0ubuntu3.4 libbluetooth3 5.53-0ubuntu3.4
Ubuntu 18.04 LTS: bluez 5.48-0ubuntu3.6 libbluetooth3 5.48-0ubuntu3.6
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-5155-1 CVE-2021-3658, CVE-2021-41229, CVE-2021-43400
Package Information: https://launchpad.net/ubuntu/+source/bluez/5.60-0ubuntu2.1 https://launchpad.net/ubuntu/+source/bluez/5.56-0ubuntu4.3 https://launchpad.net/ubuntu/+source/bluez/5.53-0ubuntu3.4 https://launchpad.net/ubuntu/+source/bluez/5.48-0ubuntu3.6
--1KfRin9pp3hEOJQycsCm9b3IQJ6nlkWcK--
--Qh4FG22nG4qOS7pP7f7YQl0dZG39Z8xLK Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature"
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAmGdSUAACgkQZWnYVadE vpOtxQ/9FLGV70D5ONoTIg1KAsun0cenXsdynXG534h25Ti3G6YWoDmwcbznjRwo BvsOrVitd3Nev/YW90cyLKqEEqYQlP11ZAO/DehJQVEAySbdyWwc/J9P8wBEDnVC HnbdicmomhfdR05cyHO0VEDEpfL6uKM2zxp6jsXi/hubvL6LSrbh4ZdzK4+7dBCJ A7c57EjQ8lu16WTGxqolkqMosMgq3nmnLQQLi2p31H1UtNDxeAggnTzHDK2/kOlQ d8nJI/VQUalX7njO9OAiqfeIddljIGdASsaTPrAPpafqEWh/OC4uQC66kXtsU7ZE 0GDcXRyeVR7Uok/fEmCvzAP8uqJfaAyRKoXYpPIN1QtewQtkbA+yYIB82lbNetMa chPL9Uk/yOg8/SlNDTLtfsCR8y1PS0UYVJb8Ovy8kqrpDGV/ktMpbYB90C4gtCiF 783WqqsYgJCyK+sXWVl2/LPjd9Q12qqj5E65H9Rk5BVadzsRkxbLUv92Ji3iyZd3 n95/UmVkVoi9RlF7x72UcpBKNXlbtbQldwipyMuUUHYbLFHNFhICcZGETb1E/sQt q/MTeGfoxmBzGMMI4ItrbWAQonXytB6zjLgszyRU8U6nz3EvnTQc9iui7Gf657dO F0e1D8v6WdvW5nRQgfrpXsOgDIOql2QV5y27L5/VukuDljzeenI= =fyUI -----END PGP SIGNATURE-----
--Qh4FG22nG4qOS7pP7f7YQl0dZG39Z8xLK--
--===============1904988286252749911== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK
--===============1904988286252749911==--
|
|
|
|