Lucas Leong discovered that BlueZ incorrectly handled the Phone Book Access profile. If a user were tricked into connecting to a malicious Bluetooth device, a remote attacker could possibly use this issue to execute arbitrary code.
{ "binaries": [ { "binary_name": "bluetooth", "binary_version": "5.53-0ubuntu3.9" }, { "binary_name": "bluez", "binary_version": "5.53-0ubuntu3.9" }, { "binary_name": "bluez-cups", "binary_version": "5.53-0ubuntu3.9" }, { "binary_name": "bluez-hcidump", "binary_version": "5.53-0ubuntu3.9" }, { "binary_name": "bluez-obexd", "binary_version": "5.53-0ubuntu3.9" }, { "binary_name": "bluez-tests", "binary_version": "5.53-0ubuntu3.9" }, { "binary_name": "libbluetooth-dev", "binary_version": "5.53-0ubuntu3.9" }, { "binary_name": "libbluetooth3", "binary_version": "5.53-0ubuntu3.9" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "bluetooth", "binary_version": "5.64-0ubuntu1.4" }, { "binary_name": "bluez", "binary_version": "5.64-0ubuntu1.4" }, { "binary_name": "bluez-cups", "binary_version": "5.64-0ubuntu1.4" }, { "binary_name": "bluez-hcidump", "binary_version": "5.64-0ubuntu1.4" }, { "binary_name": "bluez-meshd", "binary_version": "5.64-0ubuntu1.4" }, { "binary_name": "bluez-obexd", "binary_version": "5.64-0ubuntu1.4" }, { "binary_name": "bluez-tests", "binary_version": "5.64-0ubuntu1.4" }, { "binary_name": "libbluetooth-dev", "binary_version": "5.64-0ubuntu1.4" }, { "binary_name": "libbluetooth3", "binary_version": "5.64-0ubuntu1.4" } ], "availability": "No subscription required" }