Realtek Linux/Android Bluetooth Mesh SDK has a buffer overflow vulnerability due to insufficient validation for the length of segmented packets’ shift parameter. An unauthenticated attacker in the adjacent network can exploit this vulnerability to cause buffer overflow and disrupt service.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-31085 | Realtek Linux/Android Bluetooth Mesh SDK has a buffer overflow vulnerability due to insufficient validation for the length of segmented packets’ shift parameter. An unauthenticated attacker in the adjacent network can exploit this vulnerability to cause buffer overflow and disrupt service. |
Fixes
Solution
Realtek Linux/Android Bluetooth Mesh SDK v4.18-4.18-20220218
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-6458-5052f-1.html |
|
History
No history.
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-09-16T20:27:50.200Z
Reserved: 2022-03-07T00:00:00
Link: CVE-2022-26528
No data.
Status : Modified
Published: 2022-08-30T05:15:07.847
Modified: 2024-11-21T06:54:07.097
Link: CVE-2022-26528
No data.
OpenCVE Enrichment
No data.
EUVD