Use After Free Affecting bluez package, versions *


low

Snyk CVSS

    Attack Complexity Low
    Confidentiality High
    Integrity High

    Threat Intelligence

    EPSS 0.23% (62nd percentile)
Expand this section
NVD
9.1 critical
Expand this section
SUSE
4.8 medium
Expand this section
Red Hat
9.1 critical

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-DEBIAN11-BLUEZ-1911958
  • published 5 Nov 2021
  • disclosed 4 Nov 2021

How to fix?

There is no fixed version for Debian:11 bluez.

NVD Description

Note: Versions mentioned in the description apply only to the upstream bluez package and not the bluez package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

An issue was discovered in gatt-database.c in BlueZ 5.61. A use-after-free can occur when a client disconnects during D-Bus processing of a WriteValue call.