-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.3635
                           bluez security update
                              22 October 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           bluez
Publisher:         Debian
Operating System:  Debian GNU/Linux
                   Linux variants
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-27153  

Original Bulletin: 
   https://www.debian.org/lts/security/2020/dla-2410

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running bluez check for an updated version of the software for their
         operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------------
Debian LTS Advisory DLA-2410-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                           Chris Lamb
October 21, 2020                              https://wiki.debian.org/LTS
- - -------------------------------------------------------------------------

Package        : bluez
Version        : 5.43-2+deb9u3
CVE ID         : CVE-2020-27153

It was discovered that there was a double-free vulnerability in
bluez, a suite of Bluetooth tools, utilities and daemons.

For Debian 9 "Stretch", this problem has been fixed in version
5.43-2+deb9u3.

We recommend that you upgrade your bluez packages.

For the detailed security status of bluez please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/bluez

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -----BEGIN PGP SIGNATURE-----
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=dIeA
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=FEk+
-----END PGP SIGNATURE-----