This is not a security regression. This is upstreams fix to prevent https://github.com/skysafe/reblog/blob/main/cve-2024-0230/README.md
If you wish to to enable legacy devices (and the vulnerability) with the most recent version of BlueZ set `ClassicBondedOnly=false` in `/etc/bluetooth/input.conf`, and then run `systemctl restart bluetooth`.
Removing regression tags and marking as a duplicate of https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/2045931
This is not a security regression. This is upstreams fix to prevent https:/ /github. com/skysafe/ reblog/ blob/main/ cve-2024- 0230/README. md
If you wish to to enable legacy devices (and the vulnerability) with the most recent version of BlueZ set `ClassicBondedO nly=false` in `/etc/bluetooth /input. conf`, and then run `systemctl restart bluetooth`.
Removing regression tags and marking as a duplicate of https:/ /bugs.launchpad .net/ubuntu/ +source/ bluez/+ bug/2045931