Hide Forgot
A heap-based buffer overflow was found in BlueZ in the implementation of the gatt protocol due to an integer overflow. Upstream commit: https://github.com/bluez/bluez/commit/591c546c536b42bef696d027f64aa22434f8c3f0 Reference: https://github.com/bluez/bluez/security/advisories/GHSA-479m-xcq5-9g2q
Created bluez tracking bugs for this issue: Affects: fedora-all [bug 2039808]
Marking services not affected for Bluetooth vulnerability.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-0204
The Github advisory referenced by the CVE (https://github.com/bluez/bluez/security/advisories/GHSA-479m-xcq5-9g2q) seems to claim this vulnerability can result in remote code execution, but the CVE says the impact is only denial of service. Why the discrepancy? Also, for the benefit of downstreams, can a reference to the patch be added to the CVE?