Your submission was sent successfully! Close

CVE-2021-3658

Published: 28 July 2021

bluetoothd from bluez incorrectly saves adapters' Discoverable status when a device is powered down, and restores it when powered up. If a device is powered down while discoverable, it will be discoverable when powered on again. This could lead to inadvertent exposure of the bluetooth stack to physically nearby attackers.

Priority

Low

CVSS 3 base score: 6.5

Status

Package Release Status
bluez
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(code not present)
focal
Released (5.53-0ubuntu3.4)
hirsute
Released (5.56-0ubuntu4.3)
impish
Released (5.60-0ubuntu2.1)
jammy Not vulnerable
(5.62-0ubuntu1)
trusty Does not exist

upstream
Released (5.61-1)
xenial Not vulnerable
(code not present)
Patches:
upstream: https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=b497b5942a8beb8f89ca1c359c54ad67ec843055

Notes

AuthorNote
mdeslaur
probably introduced by this commit:
https://github.com/bluez/bluez/commit/d04eb02f9bad8795297210ef80e262be16ea8f07
so bionic and older aren't vulnerable

References