Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2022-3563

Published: 17 October 2022

A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function read_50_controller_cap_complete of the file tools/mgmt-tester.c of the component BlueZ. The manipulation of the argument cap_len leads to null pointer dereference. It is recommended to apply a patch to fix this issue. VDB-211086 is the identifier assigned to this vulnerability.

Notes

AuthorNote
mdeslaur
introduced in 5.56
This flaw is only in the mgmt-tester tool in the bluez-tests
package in universe, this isn't normally used

Priority

Low

Cvss 3 Severity Score

5.7

Score breakdown

Status

Package Release Status
bluez
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(code not present)
focal Not vulnerable
(code not present)
jammy
Released (5.64-0ubuntu1.3)
kinetic Not vulnerable
(5.65-0ubuntu1)
lunar Not vulnerable
(5.65-0ubuntu1)
mantic Not vulnerable
(5.65-0ubuntu1)
noble Not vulnerable
(5.65-0ubuntu1)
trusty Ignored
(end of standard support)
upstream
Released (5.65-1)
xenial
Released (5.37-0ubuntu5.3+esm4)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
Patches:
upstream: https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=e3c92f1f786f0b55440bd908b55894d0c792cf0e
Binaries built from this source package are in Universe and so are supported by the community.

Severity score breakdown

Parameter Value
Base score 5.7
Attack vector Adjacent
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H