First published: Thu Nov 04 2021(Updated: )
An issue was discovered in gatt-database.c in BlueZ 5.61. A use-after-free can occur when a client disconnects during D-Bus processing of a WriteValue call.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BlueZ BlueZ | =5.61 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43400 is a vulnerability discovered in BlueZ 5.61 that allows for a use-after-free condition when a client disconnects during D-Bus processing of a WriteValue call.
CVE-2021-43400 has a severity rating of 9.1, which is considered critical.
BlueZ 5.61 and Debian Linux 10.0 are affected by CVE-2021-43400.
To fix CVE-2021-43400, it is recommended to update to a patched version of BlueZ 5.61 or Debian Linux 10.0.
More information about CVE-2021-43400 can be found at the following references: [Link 1](https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=838c0dc7641e1c991c0f3027bf94bee4606012f8), [Link 2](https://lists.debian.org/debian-lts-announce/2022/10/msg00026.html).