{"id":"MGASA-2021-0532","summary":"Updated bluez packages fix security vulnerability","details":"BlueZ is a Bluetooth protocol stack for Linux. In affected versions a\nvulnerability exists in sdp_cstate_alloc_buf which allocates memory which\nwill always be hung in the singly linked list of cstates and will not be\nfreed. This will cause a memory leak over time. The data can be a very\nlarge object, which can be caused by an attacker continuously sending sdp\npackets and this may cause the service of the target device to crash.\n(CVE-2021-41229)\n\nAn issue was discovered in gatt-database.c in BlueZ 5.61. A use-after-free\ncan occur when a client disconnects during D-Bus processing of a WriteValue\ncall. (CVE-2021-43400)\n","modified":"2026-02-01T17:50:00.411987Z","published":"2021-12-02T16:49:28Z","related":["CVE-2021-41229","CVE-2021-43400"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2021-0532.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=29694"},{"type":"REPORT","url":"https://ubuntu.com/security/notices/USN-5155-1"}],"affected":[{"package":{"name":"bluez","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/bluez?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.55-3.3.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0532.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}