vulnerability
Amazon Linux 2023: CVE-2022-3563: Low priority package update for bluez
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:A/AC:L/Au:S/C:N/I:N/A:C) | Jun 23, 2022 | Feb 17, 2025 | Jul 4, 2025 |
Severity
6
CVSS
(AV:A/AC:L/Au:S/C:N/I:N/A:C)
Published
Jun 23, 2022
Added
Feb 17, 2025
Modified
Jul 4, 2025
Description
A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function read_50_controller_cap_complete of the file tools/mgmt-tester.c of the component BlueZ. The manipulation of the argument cap_len leads to null pointer dereference. It is recommended to apply a patch to fix this issue. VDB-211086 is the identifier assigned to this vulnerability.
A vulnerability has been found in BlueZ. This issue affects the read_50_controller_cap_complete function of the tools/mgmt-tester.c file in the BlueZ component. A manipulation of the cap_len argument leads to null pointer dereference.
A vulnerability has been found in BlueZ. This issue affects the read_50_controller_cap_complete function of the tools/mgmt-tester.c file in the BlueZ component. A manipulation of the cap_len argument leads to null pointer dereference.
Solutions
amazon-linux-2023-upgrade-bluezamazon-linux-2023-upgrade-bluez-cupsamazon-linux-2023-upgrade-bluez-cups-debuginfoamazon-linux-2023-upgrade-bluez-debuginfoamazon-linux-2023-upgrade-bluez-debugsourceamazon-linux-2023-upgrade-bluez-deprecatedamazon-linux-2023-upgrade-bluez-deprecated-debuginfoamazon-linux-2023-upgrade-bluez-hid2hciamazon-linux-2023-upgrade-bluez-hid2hci-debuginfoamazon-linux-2023-upgrade-bluez-libsamazon-linux-2023-upgrade-bluez-libs-debuginfoamazon-linux-2023-upgrade-bluez-libs-develamazon-linux-2023-upgrade-bluez-libs-devel-debuginfoamazon-linux-2023-upgrade-bluez-meshamazon-linux-2023-upgrade-bluez-mesh-debuginfoamazon-linux-2023-upgrade-bluez-obexdamazon-linux-2023-upgrade-bluez-obexd-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.