It was discovered that BlueZ incorrectly validated certain capabilities and lengths when handling the A2DP profile. A remote attacker could use this issue to cause BlueZ to crash, resulting in a denial of service, or possibly execute arbitrary code.
{ "availability": "No subscription required", "binaries": [ { "libbluetooth3": "5.48-0ubuntu3.9", "bluetooth": "5.48-0ubuntu3.9", "bluez-hcidump": "5.48-0ubuntu3.9", "bluez-cups": "5.48-0ubuntu3.9", "bluez-tests": "5.48-0ubuntu3.9", "libbluetooth3-dbg": "5.48-0ubuntu3.9", "bluez-dbg": "5.48-0ubuntu3.9", "libbluetooth-dev": "5.48-0ubuntu3.9", "bluez": "5.48-0ubuntu3.9", "bluez-obexd": "5.48-0ubuntu3.9" } ] }
{ "availability": "No subscription required", "binaries": [ { "libbluetooth3": "5.53-0ubuntu3.6", "bluetooth": "5.53-0ubuntu3.6", "bluez-hcidump": "5.53-0ubuntu3.6", "bluez-cups": "5.53-0ubuntu3.6", "bluez-tests": "5.53-0ubuntu3.6", "libbluetooth3-dbg": "5.53-0ubuntu3.6", "bluez-dbg": "5.53-0ubuntu3.6", "libbluetooth-dev": "5.53-0ubuntu3.6", "bluez": "5.53-0ubuntu3.6", "bluez-obexd": "5.53-0ubuntu3.6" } ] }