Use After Free Affecting bluez package, versions <5.50-1.2~deb10u3
Threat Intelligence
EPSS
0.26% (66th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-BLUEZ-1911955
- published 5 Nov 2021
- disclosed 4 Nov 2021
Introduced: 4 Nov 2021
CVE-2021-43400 Open this link in a new tabHow to fix?
Upgrade Debian:10 bluez to version 5.50-1.2~deb10u3 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream bluez package and not the bluez package as distributed by Debian.
See How to fix? for Debian:10 relevant fixed versions and status.
An issue was discovered in gatt-database.c in BlueZ 5.61. A use-after-free can occur when a client disconnects during D-Bus processing of a WriteValue call.
CVSS Scores
version 3.1