|Category:||Debian Local Security Checks|
|Title:||Debian LTS: Security Advisory for bluez (DLA-2240-1)|
|Summary:||The remote host is missing an update for the 'bluez'; package(s) announced via the DLA-2240-1 advisory.|
The remote host is missing an update for the 'bluez'
package(s) announced via the DLA-2240-1 advisory.
It was reported that the BlueZ's HID and HOGP profile implementations
don't specifically require bonding between the device and the host.
Malicious devices can take advantage of this flaw to connect to a target
host and impersonate an existing HID device without security or to cause
an SDP or GATT service discovery to take place which would allow HID
reports to be injected to the input subsystem from a non-bonded source.
For the HID profile an new configuration option (ClassicBondedOnly) is
introduced to make sure that input connections only come from bonded
device connections. The options defaults to 'false' to maximize device
Note that as a result of the significant changes between the previous
version in Jessie (based on upstream release 5.23) and the available
patches to address this vulnerability, it was decided that a backport of
the bluez package from Debian 9 'Stretch' was the only viable way to
address the referenced vulnerability.
'bluez' package(s) on Debian Linux.
For Debian 8 'Jessie', this problem has been fixed in version
We recommend that you upgrade your bluez packages.
Common Vulnerability Exposure (CVE) ID: CVE-2020-0556|
Debian Security Information: DSA-4647 (Google Search)
SuSE Security Announcement: openSUSE-SU-2020:0479 (Google Search)
SuSE Security Announcement: openSUSE-SU-2020:0872 (Google Search)
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.