Ubuntu alert USN-7222-1 (bluez)
From: | Marc Deslauriers <marc.deslauriers@canonical.com> | |
To: | "ubuntu-security-announce@lists.ubuntu.com" <ubuntu-security-announce@lists.ubuntu.com> | |
Subject: | [USN-7222-1] BlueZ vulnerabilities | |
Date: | Wed, 22 Jan 2025 13:19:15 -0500 | |
Message-ID: | <a8072d35-8127-4388-ae46-c35b805a7e7d@canonical.com> |
========================================================================== Ubuntu Security Notice USN-7222-1 January 22, 2025 bluez vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS Summary: BlueZ could be made to run programs as an administrator if it connected to a malicious Bluetooth device. Software Description: - bluez: Bluetooth tools and daemons Details: Lucas Leong discovered that BlueZ incorrectly handled the Phone Book Access profile. If a user were tricked into connecting to a malicious Bluetooth device, a remote attacker could possibly use this issue to execute arbitrary code. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS bluez 5.64-0ubuntu1.4 libbluetooth3 5.64-0ubuntu1.4 Ubuntu 20.04 LTS bluez 5.53-0ubuntu3.9 libbluetooth3 5.53-0ubuntu3.9 In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-7222-1 CVE-2023-50229, CVE-2023-50230 Package Information: https://launchpad.net/ubuntu/+source/bluez/5.64-0ubuntu1.4 https://launchpad.net/ubuntu/+source/bluez/5.53-0ubuntu3.9
Attachment: OpenPGP_signature.asc (type=application/pgp-signature)
-----BEGIN PGP SIGNATURE----- wsF5BAABCAAjFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAmeRNqMFAwAAAAAACgkQZWnYVadEvpMX fQ/+Mfuhpy1hqLXbMG8qtPLCQ0iQbrm6BcuU8yNBaz71uGhYvpx0222kRtaSGsstIs28r0Tw/oLy UpzDEFxzlaJEcnKvI5Q8PjGIXaOv2oFtsgqFCM7OZPdDKLxkRLHitYZ8USMP83O7PAb8jSUIngP/ 8PftsIP/2YDnL47IMuAgd3549fneTjkKF90p6WIRaP0kzOTCCz16DwBIzC3SjyWL0+LYHEqmG7HJ 8/ScKv8MpeX9ZrfB7CQVLXouCuMuCgSI5fxhAf1uhBaDAj6P9VkFoAf2ItPVlcU7fwpisZUaDdJD /3/IWOOPUUw6125Sh+SSbM6ptNUlNQ1c+yoTT5iWlRtwDjl5AROzyWP/jU7R3FEv6EbvCoI3XxNL oZ7GSzqvBleRzdlYBUKQoa9TZaVC8/QFiA3fTvTN6ck9FdPJVG4fkSvuUWm/hIjCDzUAzuDIppje CxFmUpEisEx6yK4iGPNmI8xZr7O/lC8KceSpYPQ5LR7tH+7Cy74NY+NflGIcIZNNHCNMV/2xk7X5 2dZeG8/jvAZYSiZKogmRTwdNM2LNvIJIL6PpNXo0TRTDKLygcUlWVC0RUa440lrO/+xXnVnEgoY4 o/+ZEoPUK9JF88IdWFssZ4hxpGeAwDYroS/ie4LosyhD+M1OVEEQuAVcDNRXrtduA0FTI+rbj5iw TC4= =aJcM -----END PGP SIGNATURE-----
Attachment: None (type=text/plain)