CVE-2021-0129

NameCVE-2021-0129
DescriptionImproper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2689-1, DLA-2690-1, DLA-2692-1, DSA-4951-1
Debian Bugs989614

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
bluez (PTS)buster5.50-1.2~deb10u2fixed
buster (security)5.50-1.2~deb10u4fixed
bullseye (security), bullseye5.55-3.1+deb11u1fixed
bookworm, bookworm (security)5.66-1+deb12u1fixed
sid, trixie5.71-1fixed
linux (PTS)buster4.19.249-2fixed
buster (security)4.19.304-1fixed
bullseye5.10.209-2fixed
bullseye (security)5.10.205-2fixed
bookworm6.1.76-1fixed
bookworm (security)6.1.69-1fixed
trixie6.6.15-2fixed
sid6.7.9-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
bluezsourcestretch5.43-2+deb9u4DLA-2692-1
bluezsourcebuster5.50-1.2~deb10u2DSA-4951-1
bluezsource(unstable)5.55-3.1989614
linuxsourcestretch4.9.272-1DLA-2689-1
linuxsourcebuster4.19.194-1
linuxsource(unstable)5.10.40-1
linux-4.19sourcestretch4.19.194-1~deb9u1DLA-2690-1

Notes

https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=00da0fb4972cf59e1c075f313da81ea549cb8738
https://git.kernel.org/linus/6d19628f539fccf899298ff02ee4c73e4bf6df3f
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html

Search for package or bug name: Reporting problems