Bug 2278787 (CVE-2023-27349)
Summary: | CVE-2023-27349 BlueZ: Audio Profile AVRCP Improper Validation of Array Index Remote Code Execution Vulnerability | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | TEJ RATHI <trathi> |
Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | Keywords: | Security |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | bluez 5.67 | Doc Type: | If docs needed, set a value |
Doc Text: |
A vulnerability was found in the BlueZ Audio Profile AVRCP, stemming from the improper validation of array indices. This flaw resides in the AVRCP protocol handling and arises due to inadequate validation of user-supplied data. Consequently, it may lead to writing beyond the bounds of an allocated buffer. This flaw possibly allows a network-adjacent attacker to execute code within the root context via Bluetooth.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 2278862 |
Description
TEJ RATHI
2024-05-03 04:47:08 UTC
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:9413 https://access.redhat.com/errata/RHSA-2024:9413 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:4043 https://access.redhat.com/errata/RHSA-2025:4043 |