{"id":"USN-4989-1","summary":"bluez vulnerabilities","details":"It was discovered that BlueZ incorrectly checked certain permissions when\npairing. A local attacker could possibly use this issue to impersonate\ndevices. (CVE-2020-26558)\n\nJay LV discovered that BlueZ incorrectly handled redundant disconnect MGMT\nevents. A local attacker could use this issue to cause BlueZ to crash,\nresulting in a denial of service, or possibly execute arbitrary code. This\nissue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-27153)\n\nZiming Zhang discovered that BlueZ incorrectly handled certain array\nindexes. A local attacker could use this issue to cause BlueZ to crash,\nresulting in a denial of service, or possibly obtain sensitive information.\nThis issue only affected Ubuntu 20.04 LTS and Ubuntu 20.10. (CVE-2021-3588)\n","modified":"2026-02-10T04:42:14Z","published":"2021-06-16T12:18:32Z","related":["UBUNTU-CVE-2020-26558","UBUNTU-CVE-2020-27153","UBUNTU-CVE-2021-3588"],"upstream":["CVE-2020-26558","CVE-2020-27153","CVE-2021-3588","UBUNTU-CVE-2020-26558","UBUNTU-CVE-2020-27153","UBUNTU-CVE-2021-3588"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4989-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-26558"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-27153"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3588"}],"affected":[{"package":{"name":"bluez","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/bluez@5.48-0ubuntu3.5?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.48-0ubuntu3.5"}]}],"versions":["5.46-0ubuntu3","5.46-0ubuntu4","5.48-0ubuntu3","5.48-0ubuntu3.1","5.48-0ubuntu3.2","5.48-0ubuntu3.3","5.48-0ubuntu3.4"],"ecosystem_specific":{"binaries":[{"binary_name":"bluetooth","binary_version":"5.48-0ubuntu3.5"},{"binary_name":"bluez","binary_version":"5.48-0ubuntu3.5"},{"binary_name":"bluez-cups","binary_version":"5.48-0ubuntu3.5"},{"binary_name":"bluez-hcidump","binary_version":"5.48-0ubuntu3.5"},{"binary_name":"bluez-obexd","binary_version":"5.48-0ubuntu3.5"},{"binary_name":"bluez-tests","binary_version":"5.48-0ubuntu3.5"},{"binary_name":"libbluetooth-dev","binary_version":"5.48-0ubuntu3.5"},{"binary_name":"libbluetooth3","binary_version":"5.48-0ubuntu3.5"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2020-26558","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-27153","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"type":"Ubuntu","score":"low"}]}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4989-1.json"}},{"package":{"name":"bluez","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/bluez@5.53-0ubuntu3.2?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.53-0ubuntu3.2"}]}],"versions":["5.50-0ubuntu4","5.51-0ubuntu1","5.51-0ubuntu2","5.52-0ubuntu1","5.52-0ubuntu2","5.53-0ubuntu1","5.53-0ubuntu2","5.53-0ubuntu3","5.53-0ubuntu3.1"],"ecosystem_specific":{"binaries":[{"binary_name":"bluetooth","binary_version":"5.53-0ubuntu3.2"},{"binary_name":"bluez","binary_version":"5.53-0ubuntu3.2"},{"binary_name":"bluez-cups","binary_version":"5.53-0ubuntu3.2"},{"binary_name":"bluez-hcidump","binary_version":"5.53-0ubuntu3.2"},{"binary_name":"bluez-obexd","binary_version":"5.53-0ubuntu3.2"},{"binary_name":"bluez-tests","binary_version":"5.53-0ubuntu3.2"},{"binary_name":"libbluetooth-dev","binary_version":"5.53-0ubuntu3.2"},{"binary_name":"libbluetooth3","binary_version":"5.53-0ubuntu3.2"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2020-26558","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-27153","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-3588","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:20.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4989-1.json"}}],"schema_version":"1.7.3"}