Name | CVE-2021-34147 |
Description | The Bluetooth Classic implementation in the Cypress WICED BT stack through 2.9.0 for CYW20735B1 does not properly handle the reception of a malformed LMP timing accuracy response followed by multiple reconnections to the link slave, allowing attackers to exhaust device BT resources and eventually trigger a crash via multiple attempts of sending a crafted LMP timing accuracy response followed by a sudden reconnection with a random BDAddress. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1024356 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
bluez-firmware (PTS) | bullseye/non-free | 1.2-4 | fixed |
| bookworm/non-free-firmware | 1.2-9 | fixed |
| trixie/non-free-firmware | 1.2-11.1 | fixed |
| sid/non-free-firmware | 1.2-12 | fixed |
The information below is based on the following data on fixed versions.
Notes
[bullseye] - bluez-firmware <not-affected> (Affected firmware not present, introduced in bluez-firmware/1.2-6)
[buster] - bluez-firmware <not-affected> (Affected firmware not present, introduced in bluez-firmware/1.2-6)
https://github.com/RPi-Distro/bluez-firmware/commit/31ad68831357d2019624004f1f0846475671088f