Source: bluez Version: 5.55-3 Severity: grave Tags: security upstream Forwarded: https://github.com/bluez/bluez/issues/70 X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for bluez. CVE-2021-3588[0]: | The cli_feat_read_cb() function in src/gatt-database.c does not | perform bounds checks on the 'offset' variable before using it as an | index into an array for reading. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2021-3588 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3588 [1] https://github.com/bluez/bluez/issues/70 [2] https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1926548 [3] https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=3a40bef49305f8327635b81ac8be52a3ca063d5a Regards, Salvatore