answered
2020-02-07 16:23:52 +0200
@Fuzzillogic in comment 2 under the link you posted, remote user "jruge" writes:
Linux systems usually use Bluez, what
is a different project than the
Android Bluetooth stack. We have
applied the same fuzzing technique
against an Ubuntu system and could not
observe any crashes.
Sailfish uses bluez5 or even bluez4 (if you happen to have older hardware). On my JP1301 phone, I have only the following daemon running:
# rpm -q --whatprovides /usr/sbin/bluetoothd
bluez-4.101+git77-1.3.1.jolla.armv7hl
I also have a pand
running, which talks to the bluetoothd
service using sockets.
Thus, as the vulnerability affects the Android bluetooth daemon, Sailfish is not affected.
@Fuzzillogic Did you accept my answer? I still don't see clear evidence for us all being safe from this regardless of the actual device we use. I would be more confident if someone could review the sources of the daemon mentioned in this answer looking for code similar to this. Thank you. @Fuzzillogic, for bringing this topic here.
Maus ( 2020-02-15 20:24:34 +0200 )edit@Maus no I didn't.. And I agree, I'm still not sure if the problem really doesn't exist on any SFOS device. I can only hope that whoever did mark the question as answered is really sure about it.
Fuzzillogic ( 2020-02-15 23:43:26 +0200 )edit