First published: Mon Oct 17 2022(Updated: )
A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function read_50_controller_cap_complete of the file tools/mgmt-tester.c of the component BlueZ. The manipulation of the argument cap_len leads to null pointer dereference. It is recommended to apply a patch to fix this issue. VDB-211086 is the identifier assigned to this vulnerability.
Credit: cna@vuldb.com cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
BlueZ BlueZ | <5.65 | |
ubuntu/bluez | <5.64-0ubuntu1.3 | 5.64-0ubuntu1.3 |
ubuntu/bluez | <5.65-1 | 5.65-1 |
ubuntu/bluez | <5.37-0ubuntu5.3+ | 5.37-0ubuntu5.3+ |
debian/bluez | 5.55-3.1+deb11u1 5.66-1+deb12u2 5.66-1+deb12u1 5.77-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-3563.
The severity of CVE-2022-3563 is medium with a severity value of 5.7.
The function read_50_controller_cap_complete of the file tools/mgmt-tester.c of BlueZ is affected by CVE-2022-3563.
It is recommended to apply a patch to address CVE-2022-3563.
You can find more information about CVE-2022-3563 at the following references: [1](https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=e3c92f1f786f0b55440bd908b55894d0c792cf0e) [2](https://vuldb.com/?id.211086)