{"id":"USN-7265-1","summary":"bluez vulnerabilities","details":"Julian Rauchberger discovered that BlueZ did not correctly handle certain\nmemory operations. An attacker could possibly use this issue to leak\nsensitive information or execute arbitrary code.\n(CVE-2019-8921, CVE-2019-8922)\n","modified":"2026-05-20T16:03:42.994519739Z","published":"2025-02-12T06:51:21Z","related":["UBUNTU-CVE-2019-8921","UBUNTU-CVE-2019-8922"],"upstream":["CVE-2019-8921","CVE-2019-8922","UBUNTU-CVE-2019-8921","UBUNTU-CVE-2019-8922"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7265-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-8921"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-8922"}],"affected":[{"package":{"name":"bluez","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/bluez?arch=source&distro=esm-apps%2Fxenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.37-0ubuntu5.3+esm5"}]}],"versions":["5.35-0ubuntu2","5.36-0ubuntu1","5.37-0ubuntu5","5.37-0ubuntu5.1","5.37-0ubuntu5.3","5.37-0ubuntu5.3+esm1","5.37-0ubuntu5.3+esm2","5.37-0ubuntu5.3+esm3","5.37-0ubuntu5.3+esm4"],"ecosystem_specific":{"binaries":[{"binary_name":"bluetooth","binary_version":"5.37-0ubuntu5.3+esm5"},{"binary_version":"5.37-0ubuntu5.3+esm5","binary_name":"bluez"},{"binary_version":"5.37-0ubuntu5.3+esm5","binary_name":"bluez-cups"},{"binary_version":"5.37-0ubuntu5.3+esm5","binary_name":"bluez-hcidump"},{"binary_version":"5.37-0ubuntu5.3+esm5","binary_name":"bluez-obexd"},{"binary_version":"5.37-0ubuntu5.3+esm5","binary_name":"bluez-tests"},{"binary_version":"5.37-0ubuntu5.3+esm5","binary_name":"libbluetooth3"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7265-1.json","cves_map":{"cves":[],"ecosystem":"Ubuntu:Pro:16.04:LTS"}}}],"schema_version":"1.7.5"}