First published: Mon Nov 29 2021(Updated: )
A heap-based buffer overflow was discovered in bluetoothd in BlueZ through 5.48. There isn't any check on whether there is enough space in the destination buffer. The function simply appends all data passed to it. The values of all attributes that are requested are appended to the output buffer. There are no size checks whatsoever, resulting in a simple heap overflow if one can craft a request where the response is large enough to overflow the preallocated buffer. This issue exists in service_attr_req gets called by process_request (in sdpd-request.c), which also allocates the response buffer.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BlueZ BlueZ | <=5.48 | |
Linux Linux kernel | ||
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8922 is a heap-based buffer overflow vulnerability that was discovered in bluetoothd in BlueZ through version 5.48.
The severity level of CVE-2019-8922 is high with a CVSS score of 8.8.
BlueZ versions up to and including 5.48 are affected by CVE-2019-8922.
Apply the latest patch or update provided by BlueZ to fix CVE-2019-8922.
You can find more information about CVE-2019-8922 at the following references: <br> - [Debian LTS Announcement](https://lists.debian.org/debian-lts-announce/2022/10/msg00026.html) <br> - [NetApp Security Advisory](https://security.netapp.com/advisory/ntap-20211203-0002/) <br> - [SSD Disclosure Advisory](https://ssd-disclosure.com/ssd-advisory-linux-bluez-information-leak-and-heap-overflow/)