Bugzilla – Bug 1193237
VUL-0: CVE-2019-8921: bluez: information leak in service_attr_req() in sdpd-request.c via a crafted CSTATE
Last modified: 2022-10-25 13:23:40 UTC
rh#2027458 An issue was discovered in bluetoothd in BlueZ through 5.48. The vulnerability lies in the handling of a SVC_ATTR_REQ by the SDP implementation. By crafting a malicious CSTATE, it is possible to trick the server into returning more bytes than the buffer actually holds, resulting in leaking arbitrary heap data. The root cause can be found in the function service_attr_req of sdpd-request.c. The server does not check whether the CSTATE data is the same in consecutive requests, and instead simply trusts that it is the same. Upstream fix commit: https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=7bf67b32709d828fafa26256b4c78331760c6e93 Vulnerable commit: https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=c787259b854f12bd827d1e05ccde53d748d22b30 (commit introducing the spdp server code) Reference: https://ssd-disclosure.com/ssd-advisory-linux-bluez-information-leak-and-heap-overflow/ References: https://bugzilla.redhat.com/show_bug.cgi?id=2027458 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8921 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8921 http://www.cvedetails.com/cve/CVE-2019-8921/ https://ssd-disclosure.com/ssd-advisory-linux-bluez-information-leak-and-heap-overflow/
Affected codestreams: - SUSE:SLE-11-SP1:Update 4.51-1.5.3.1 - SUSE:SLE-11-SP3:Update 4.99-0.9.3.1 - SUSE:SLE-11-SP4:Update - SUSE:SLE-12-SP2:Update 5.13-5.23.1 - SUSE:SLE-15:Update - SUSE:SLE-15-SP2:Update 5.48-13.3.1
(In reply to Thomas Leroy from comment #1) > Affected codestreams: > - SUSE:SLE-11-SP1:Update 4.51-1.5.3.1 > - SUSE:SLE-11-SP3:Update 4.99-0.9.3.1 > - SUSE:SLE-11-SP4:Update > - SUSE:SLE-12-SP2:Update 5.13-5.23.1 > - SUSE:SLE-15:Update > - SUSE:SLE-15-SP2:Update 5.48-13.3.1 I have backported and submit request to above SLE versions. Waiting the change be merged.
(In reply to Joey Lee from comment #5) > (In reply to Thomas Leroy from comment #1) > > Affected codestreams: > > - SUSE:SLE-11-SP1:Update 4.51-1.5.3.1 > > - SUSE:SLE-11-SP3:Update 4.99-0.9.3.1 > > - SUSE:SLE-11-SP4:Update > > - SUSE:SLE-12-SP2:Update 5.13-5.23.1 > > - SUSE:SLE-15:Update > > - SUSE:SLE-15-SP2:Update 5.48-13.3.1 > > I have backported and submit request to above SLE versions. Waiting the > change be merged. Change be merged. Reset assigner.
SUSE-SU-2022:3687-1: An update that fixes 6 vulnerabilities is now available. Category: security (important) Bug References: 1186463,1188859,1192394,1193227,1193237 CVE References: CVE-2019-8921,CVE-2019-8922,CVE-2020-26558,CVE-2021-0129,CVE-2021-3658,CVE-2021-43400 JIRA References: Sources used: SUSE Linux Enterprise Server for SAP 15-SP1 (src): bluez-5.48-150000.5.41.1 SUSE Linux Enterprise Server for SAP 15 (src): bluez-5.48-150000.5.41.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): bluez-5.48-150000.5.41.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): bluez-5.48-150000.5.41.1 SUSE Linux Enterprise Server 15-LTSS (src): bluez-5.48-150000.5.41.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): bluez-5.48-150000.5.41.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): bluez-5.48-150000.5.41.1 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): bluez-5.48-150000.5.41.1 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): bluez-5.48-150000.5.41.1 SUSE Enterprise Storage 6 (src): bluez-5.48-150000.5.41.1 SUSE CaaS Platform 4.0 (src): bluez-5.48-150000.5.41.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:3691-1: An update that fixes 6 vulnerabilities is now available. Category: security (important) Bug References: 1186463,1188859,1192394,1193227,1193237 CVE References: CVE-2019-8921,CVE-2019-8922,CVE-2020-26558,CVE-2021-0129,CVE-2021-3658,CVE-2021-43400 JIRA References: Sources used: SUSE Manager Server 4.1 (src): bluez-5.48-150200.13.17.1 SUSE Manager Retail Branch Server 4.1 (src): bluez-5.48-150200.13.17.1 SUSE Manager Proxy 4.1 (src): bluez-5.48-150200.13.17.1 SUSE Linux Enterprise Server for SAP 15-SP2 (src): bluez-5.48-150200.13.17.1 SUSE Linux Enterprise Server 15-SP2-LTSS (src): bluez-5.48-150200.13.17.1 SUSE Linux Enterprise Server 15-SP2-BCL (src): bluez-5.48-150200.13.17.1 SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src): bluez-5.48-150200.13.17.1 SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src): bluez-5.48-150200.13.17.1 SUSE Enterprise Storage 7 (src): bluez-5.48-150200.13.17.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:3718-1: An update that fixes two vulnerabilities is now available. Category: security (important) Bug References: 1013885,1193237 CVE References: CVE-2016-9803,CVE-2019-8921 JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 9 (src): bluez-5.13-5.31.1 SUSE OpenStack Cloud 9 (src): bluez-5.13-5.31.1 SUSE Linux Enterprise Workstation Extension 12-SP5 (src): bluez-5.13-5.31.1 SUSE Linux Enterprise Software Development Kit 12-SP5 (src): bluez-5.13-5.31.1 SUSE Linux Enterprise Server for SAP 12-SP4 (src): bluez-5.13-5.31.1 SUSE Linux Enterprise Server 12-SP5 (src): bluez-5.13-5.31.1 SUSE Linux Enterprise Server 12-SP4-LTSS (src): bluez-5.13-5.31.1 SUSE Linux Enterprise Server 12-SP3-BCL (src): bluez-5.13-5.31.1 SUSE Linux Enterprise Server 12-SP2-BCL (src): bluez-5.13-5.31.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.