Source: bluez
Version: 5.55-3
Severity: grave
Tags: security upstream
Forwarded: https://github.com/bluez/bluez/issues/70
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for bluez.

CVE-2021-3588[0]:
| The cli_feat_read_cb() function in src/gatt-database.c does not
| perform bounds checks on the 'offset' variable before using it as an
| index into an array for reading.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-3588
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3588
[1] https://github.com/bluez/bluez/issues/70
[2] https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1926548
[3] 
https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=3a40bef49305f8327635b81ac8be52a3ca063d5a
 

Regards,
Salvatore

Reply via email to