Lucas Leong discovered that BlueZ incorrectly handled the Phone Book Access profile. If a user were tricked into connecting to a malicious Bluetooth device, a remote attacker could possibly use this issue to execute arbitrary code.
{
"binaries": [
{
"binary_name": "bluetooth",
"binary_version": "5.53-0ubuntu3.9"
},
{
"binary_name": "bluez",
"binary_version": "5.53-0ubuntu3.9"
},
{
"binary_name": "bluez-cups",
"binary_version": "5.53-0ubuntu3.9"
},
{
"binary_name": "bluez-hcidump",
"binary_version": "5.53-0ubuntu3.9"
},
{
"binary_name": "bluez-obexd",
"binary_version": "5.53-0ubuntu3.9"
},
{
"binary_name": "bluez-tests",
"binary_version": "5.53-0ubuntu3.9"
},
{
"binary_name": "libbluetooth3",
"binary_version": "5.53-0ubuntu3.9"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_name": "bluetooth",
"binary_version": "5.64-0ubuntu1.4"
},
{
"binary_name": "bluez",
"binary_version": "5.64-0ubuntu1.4"
},
{
"binary_name": "bluez-cups",
"binary_version": "5.64-0ubuntu1.4"
},
{
"binary_name": "bluez-hcidump",
"binary_version": "5.64-0ubuntu1.4"
},
{
"binary_name": "bluez-meshd",
"binary_version": "5.64-0ubuntu1.4"
},
{
"binary_name": "bluez-obexd",
"binary_version": "5.64-0ubuntu1.4"
},
{
"binary_name": "bluez-tests",
"binary_version": "5.64-0ubuntu1.4"
},
{
"binary_name": "libbluetooth3",
"binary_version": "5.64-0ubuntu1.4"
}
],
"availability": "No subscription required"
}