Bug 2039807 (CVE-2022-0204)
Summary: | CVE-2022-0204 bluez: heap-based buffer overflow in the implementation of the gatt protocol | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | ajak, bdettelb, bnocera, darcari, dwmw2, dzickus, gtiwari, hwkernel-mgr, jburrell, pbrobinson, spacewar |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | bluez 5.63 | Doc Type: | If docs needed, set a value |
Doc Text: |
A heap overflow vulnerability was found in bluez. An attacker with local network access could pass specially crafted files causing an application to halt or crash, leading to a denial of service.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-01-12 16:00:55 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2039808 | ||
Bug Blocks: | 2027823, 2039809 |
Description
Guilherme de Almeida Suckevicz
2022-01-12 13:40:19 UTC
Created bluez tracking bugs for this issue: Affects: fedora-all [bug 2039808] Marking services not affected for Bluetooth vulnerability. This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-0204 The Github advisory referenced by the CVE (https://github.com/bluez/bluez/security/advisories/GHSA-479m-xcq5-9g2q) seems to claim this vulnerability can result in remote code execution, but the CVE says the impact is only denial of service. Why the discrepancy? Also, for the benefit of downstreams, can a reference to the patch be added to the CVE? |