
CVE-2022-3637 – Linux Kernel BlueZ jlink.c jlink_init denial of service
https://notcve.org/view.php?id=CVE-2022-3637
21 Oct 2022 — A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function jlink_init of the file monitor/jlink.c of the component BlueZ. The manipulation leads to denial of service. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211936. • https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=1d6cfb8e625a944010956714c1802bc1e1fc6c4f • CWE-404: Improper Resource Shutdown or Release •

CVE-2022-3563 – Linux Kernel BlueZ mgmt-tester.c read_50_controller_cap_complete null pointer dereference
https://notcve.org/view.php?id=CVE-2022-3563
17 Oct 2022 — A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function read_50_controller_cap_complete of the file tools/mgmt-tester.c of the component BlueZ. The manipulation of the argument cap_len leads to null pointer dereference. It is recommended to apply a patch to fix this issue. VDB-211086 is the identifier assigned to this vulnerability. • https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=e3c92f1f786f0b55440bd908b55894d0c792cf0e • CWE-404: Improper Resource Shutdown or Release •

CVE-2022-39176
https://notcve.org/view.php?id=CVE-2022-39176
02 Sep 2022 — BlueZ before 5.59 allows physically proximate attackers to obtain sensitive information because profiles/audio/avrcp.c does not validate params_len. BlueZ versiones anteriores a 5.59, permite a atacantes físicamente próximos obtener información confidencial porque el archivo profiles/audio/avrcp.c no comprueba params_len • https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1977968 •

CVE-2022-39177
https://notcve.org/view.php?id=CVE-2022-39177
02 Sep 2022 — BlueZ before 5.59 allows physically proximate attackers to cause a denial of service because malformed and invalid capabilities can be processed in profiles/audio/avdtp.c. BlueZ versiones anteriores a 5.59, permite a atacantes físicamente próximos causar una denegación de servicio porque pueden procesarse capacidades malformadas e inválidas en el archivo profiles/audio/avdtp.c • https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1977968 •

CVE-2022-0204 – Ubuntu Security Notice USN-5275-1
https://notcve.org/view.php?id=CVE-2022-0204
08 Feb 2022 — A heap overflow vulnerability was found in bluez in versions prior to 5.63. An attacker with local network access could pass specially crafted files causing an application to halt or crash, leading to a denial of service. Se encontró una vulnerabilidad de desbordamiento de pila en bluez en versiones anteriores a la 5.63. Un atacante con acceso a la red local podría pasar archivos especialmente diseñados causando a una aplicación detenerse o bloquearse, conllevando a una denegación de servicio Ziming Zhang d... • https://bugzilla.redhat.com/show_bug.cgi?id=2039807 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-190: Integer Overflow or Wraparound •

CVE-2019-8921 – Ubuntu Security Notice USN-7265-1
https://notcve.org/view.php?id=CVE-2019-8921
29 Nov 2021 — An issue was discovered in bluetoothd in BlueZ through 5.48. The vulnerability lies in the handling of a SVC_ATTR_REQ by the SDP implementation. By crafting a malicious CSTATE, it is possible to trick the server into returning more bytes than the buffer actually holds, resulting in leaking arbitrary heap data. The root cause can be found in the function service_attr_req of sdpd-request.c. The server does not check whether the CSTATE data is the same in consecutive requests, and instead simply trusts that it... • https://lists.debian.org/debian-lts-announce/2022/10/msg00026.html • CWE-345: Insufficient Verification of Data Authenticity •

CVE-2019-8922 – Ubuntu Security Notice USN-5183-1
https://notcve.org/view.php?id=CVE-2019-8922
29 Nov 2021 — A heap-based buffer overflow was discovered in bluetoothd in BlueZ through 5.48. There isn't any check on whether there is enough space in the destination buffer. The function simply appends all data passed to it. The values of all attributes that are requested are appended to the output buffer. There are no size checks whatsoever, resulting in a simple heap overflow if one can craft a request where the response is large enough to overflow the preallocated buffer. • https://lists.debian.org/debian-lts-announce/2022/10/msg00026.html • CWE-787: Out-of-bounds Write •

CVE-2021-3658 – Ubuntu Security Notice USN-5155-1
https://notcve.org/view.php?id=CVE-2021-3658
24 Nov 2021 — bluetoothd from bluez incorrectly saves adapters' Discoverable status when a device is powered down, and restores it when powered up. If a device is powered down while discoverable, it will be discoverable when powered on again. This could lead to inadvertent exposure of the bluetooth stack to physically nearby attackers. bluetoothd de bluez guarda incorrectamente el estado Discoverable de los adaptadores cuando es apagado un dispositivo, y lo restaura cuando es encendido. Si un dispositivo es apagado mient... • https://bugzilla.redhat.com/show_bug.cgi?id=1984728 • CWE-863: Incorrect Authorization •

CVE-2021-41229 – Memory leak in BlueZ
https://notcve.org/view.php?id=CVE-2021-41229
12 Nov 2021 — BlueZ is a Bluetooth protocol stack for Linux. In affected versions a vulnerability exists in sdp_cstate_alloc_buf which allocates memory which will always be hung in the singly linked list of cstates and will not be freed. This will cause a memory leak over time. The data can be a very large object, which can be caused by an attacker continuously sending sdp packets and this may cause the service of the target device to crash. BlueZ es una pila de protocolos Bluetooth para Linux. • https://github.com/bluez/bluez/security/advisories/GHSA-3fqg-r8j5-f5xq • CWE-400: Uncontrolled Resource Consumption CWE-401: Missing Release of Memory after Effective Lifetime •

CVE-2021-43400 – Ubuntu Security Notice USN-5155-1
https://notcve.org/view.php?id=CVE-2021-43400
04 Nov 2021 — An issue was discovered in gatt-database.c in BlueZ 5.61. A use-after-free can occur when a client disconnects during D-Bus processing of a WriteValue call. Se ha detectado un problema en el archivo gatt-database.c en BlueZ versión 5.61. Puede producirse un uso de memoria previamente liberada cuando un cliente se desconecta durante el procesamiento de D-Bus de una llamada WriteValue It was discovered that BlueZ incorrectly handled the Discoverable status when a device is powered down. This could result in d... • https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=838c0dc7641e1c991c0f3027bf94bee4606012f8 • CWE-416: Use After Free •