From ${URL} : BlueZ provides a Bluetooth protocol stack for Linux kernel and userland utilities. parse_line() function used in some userland utilities contains a buffer overflow vulnerability. Upstream patch: http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=8514068150759c1d6a46d4605d2351babfde1601 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
per https://bugzilla.redhat.com/show_bug.cgi?id=1425117 5.43 version shouldn't be affected
git tag --contains 8514068150759c1d6a46d4605d2351babfde1601 | sort -u 5.42 5.43 5.44 >=v5.42 in repository since https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=4a287d008b4feb1268d81a6d8f94de05d225a61e Repository is clean. Closing as invalid because Gentoo is not affected by the reported vulnerability.