{"id":"RLSA-2024:9413","summary":"Moderate: bluez security update","details":"The bluez packages contain the following utilities for use in Bluetooth applications: hcitool, hciattach, hciconfig, bluetoothd, l2ping, start scripts (Rocky Enterprise Software Foundation), and pcmcia configuration files. \n\nSecurity Fix(es):\n\n* bluez: unauthorized HID device connections allows keystroke injection and arbitrary commands execution (CVE-2023-45866)\n\n* BlueZ: Audio Profile AVRCP Improper Validation of Array Index Remote Code Execution Vulnerability (CVE-2023-27349)\n\n* bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability (CVE-2023-51596)\n\n* bluez: OBEX library out-of-bounds read information disclosure vulnerability (CVE-2023-51594)\n\n* bluez: audio profile avrcp parse_media_folder out-of-bounds read information disclosure vulnerability (CVE-2023-51592)\n\n* bluez: audio profile avrcp parse_media_element out-of-bounds read information disclosure vulnerability (CVE-2023-51589)\n\n* bluez: avrcp_parse_attribute_list out-of-bounds read information disclosure vulnerability (CVE-2023-51580)\n\n* bluez: AVRCP stack-based buffer overflow remote code execution vulnerability (CVE-2023-44431)\n\n* bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability (CVE-2023-50230)\n\n* bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability (CVE-2023-50229)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.","modified":"2026-03-11T06:30:16.088399Z","published":"2025-03-17T20:16:43.608626Z","upstream":["CVE-2023-27349","CVE-2023-44431","CVE-2023-45866","CVE-2023-50229","CVE-2023-50230","CVE-2023-51580","CVE-2023-51589","CVE-2023-51592","CVE-2023-51594","CVE-2023-51596"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2024:9413"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253391"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278787"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278945"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278955"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278962"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278965"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278967"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278969"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278972"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278974"}],"affected":[{"package":{"name":"bluez","ecosystem":"Rocky Linux:9","purl":"pkg:rpm/rocky-linux/bluez?distro=rocky-linux-9&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.72-2.el9"}],"database_specific":{"yum_repository":"BaseOS"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2024:9413.json"}}],"schema_version":"1.7.5","credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}