Your submission was sent successfully! Close

CVE-2021-3658

Published: 28 July 2021

bluetoothd from bluez incorrectly saves adapters' Discoverable status when a device is powered down, and restores it when powered up. If a device is powered down while discoverable, it will be discoverable when powered on again. This could lead to inadvertent exposure of the bluetooth stack to physically nearby attackers.

Priority

Low

Status

Package Release Status
bluez
Launchpad, Ubuntu, Debian
Upstream
Released (5.61-1)
Ubuntu 21.10 (Impish Indri)
Released (5.60-0ubuntu2.1)
Ubuntu 21.04 (Hirsute Hippo)
Released (5.56-0ubuntu4.3)
Ubuntu 20.04 LTS (Focal Fossa)
Released (5.53-0ubuntu3.4)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(code not present)
Ubuntu 16.04 ESM (Xenial Xerus) Not vulnerable
(code not present)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Patches:
Upstream: https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=b497b5942a8beb8f89ca1c359c54ad67ec843055

Notes

AuthorNote
mdeslaur
probably introduced by this commit:
https://github.com/bluez/bluez/commit/d04eb02f9bad8795297210ef80e262be16ea8f07
so bionic and older aren't vulnerable

References

Bugs