oss-sec mailing list archives
Re: Bluez <5.53 DoS/privilege escalation
From: Marc Deslauriers <marc.deslauriers () canonical com>
Date: Fri, 13 Mar 2020 09:27:29 -0400
On 2020-03-12 6:55 p.m., Matthew Garrett wrote:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00352.html describes a vulnerability in versions below 5.53 of the Bluez Bluetooth stack. Intel do not appear to have disclosed this issue to distributions in advance, and have not yet made a release that includes the fixes. https://patchwork.kernel.org/patch/11428317/ and https://patchwork.kernel.org/patch/11428319/ should apply to older versions.
I looks like the patches went into the tree after 5.53, so I'm not sure 5.53 is actually fixed. Does anyone know if there were any other changes in 5.53 that would mitigate the issue? https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=8cdbd3b09f29da29374e2f83369df24228da0ad1 https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=3cccdbab2324086588df4ccf5f892fb3ce1f1787 Marc.
Current thread:
- Bluez <5.53 DoS/privilege escalation Matthew Garrett (Mar 13)
- Re: Bluez <5.53 DoS/privilege escalation Marc Deslauriers (Mar 13)