BlueZ is vulnerable to Information Disclosure. The vulnerability exists in multiple functions of avrcp.c
because it doesn’t properly validate params_len
which allows attackers to obtain sensitive information.
git://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2022-39176
bugs.launchpad.net/ubuntu/+source/bluez/+bug/1977968
bugs.launchpad.net/ubuntu/+source/bluez/+bug/1977968
git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=0388794dc5fdb73a4ea88bcf148de0a12b4364d4
git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=7a80d2096f1b7125085e21448112aa02f49f5e9a
git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=e21680c9355a0f9d5ef6d4a5ae032de274e87b37
git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=e2b0f0d8d63e1223bb714a9efb37e2257818268b
lists.debian.org/debian-lts-announce/2022/10/msg00026.html
security.netapp.com/advisory/ntap-20221020-0002/
ubuntu.com/security/notices/USN-5481-1