CVE-2021-3588

Published: 10 June 2021

The cli_feat_read_cb() function in src/gatt-database.c does not perform bounds checks on the 'offset' variable before using it as an index into an array for reading.

Priority

Medium

CVSS 3 base score: 3.3

Status

Package Release Status
bluez
Launchpad, Ubuntu, Debian
Upstream
Released (5.56)
Ubuntu 21.10 (Impish Indri) Not vulnerable
(5.58-0ubuntu1)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(5.56-0ubuntu4)
Ubuntu 20.04 LTS (Focal Fossa)
Released (5.53-0ubuntu3.2)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(code not present)
Ubuntu 16.04 ESM (Xenial Xerus) Not vulnerable
(code not present)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Patches:
Upstream: https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=3a40bef49305f8327635b81ac8be52a3ca063d5a (minimal)
Upstream: https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=87184a20cfcfe1523926a2e4a724c1a01c7ae0fb
Upstream: https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=6a50b6aeda78a88eafb177718109c256eec077a6