Bug 57342 - bluez: Multiple issues (5.0)
bluez: Multiple issues (5.0)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 5.0
All Linux
: P3 normal (vote)
: UCS 5.0-7-errata
Assigned To: Quality Assurance
Iván.Delgado
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2024-05-27 08:07 CEST by Quality Assurance
Modified: 2024-05-29 13:20 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 7.1 (CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2024-05-27 08:07:16 CEST
New Debian bluez 5.50-1.2~deb10u5 fixes:
This update addresses the following issue:
5.50-1.2~deb10u5 (Tue, 21 May 2024 22:00:06 +0200)
* Non-maintainer upload by the Debian LTS Team.
* CVE-2023-27349: Fix crash while handling unsupported events. This  vulnerability allows network-adjacent attackers to execute arbitrary code  via Bluetooth on affected installations of BlueZ. User interaction is  required to exploit this vulnerability in that the target must connect to a  malicious device. The specific flaw exists within the handling of the AVRCP  protocol. The issue results from the lack of proper validation of  user-supplied data, which can result in a write past the end of an  allocated buffer. An attacker can leverage this vulnerability to execute  code in the context of root.
Comment 1 Quality Assurance univentionstaff 2024-05-27 09:00:20 CEST
--- mirror/ftp/pool/main/b/bluez/bluez_5.50-1.2~deb10u4.dsc
+++ apt/ucs_5.0-0-errata5.0-7/source/bluez_5.50-1.2~deb10u5.dsc
@@ -1,3 +1,17 @@
+5.50-1.2~deb10u5 [Tue, 21 May 2024 22:00:06 +0200] Arturo Borrero Gonzalez <arturo@debian.org>:
+
+  * Non-maintainer upload by the Debian LTS Team.
+  * CVE-2023-27349: Fix crash while handling unsupported events.
+    This vulnerability allows network-adjacent attackers to execute
+    arbitrary code via Bluetooth on affected installations of BlueZ.
+    User interaction is required to exploit this vulnerability in that
+    the target must connect to a malicious device. The specific flaw
+    exists within the handling of the AVRCP protocol. The issue results
+    from the lack of proper validation of user-supplied data, which can
+    result in a write past the end of an allocated buffer. An attacker
+    can leverage this vulnerability to execute code in the context of
+    root.
+
 5.50-1.2~deb10u4 [Thu, 14 Dec 2023 14:28:50 +0000] Chris Lamb <lamby@debian.org>:
 
   * Non-maintainer upload by the Debian LTS Team.

<http://piuparts.knut.univention.de/5.0-7/#614229773939322480>
Comment 2 Iván.Delgado univentionstaff 2024-05-28 09:22:31 CEST
OK: bug
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[5.0-7] 4897cd624f Bug #57342: bluez 5.50-1.2~deb10u5
 doc/errata/staging/bluez.yaml | 4 +---
 1 file changed, 1 insertion(+), 3 deletions(-)

[5.0-7] 843a43fb50 Bug #57342: bluez 5.50-1.2~deb10u5
 doc/errata/staging/bluez.yaml | 22 ++++++++++++++++++++++
 1 file changed, 22 insertions(+)
Comment 3 Iván.Delgado univentionstaff 2024-05-29 13:20:00 CEST
<https://errata.software-univention.de/#/?erratum=5.0x1056>