BlueZ before 5.59 allows physically proximate attackers to obtain sensitive information because profiles/audio/avrcp.c does not validate params_len. https://ubuntu.com/security/notices/USN-5481-1 https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1977968
Created bluez tracking bugs for this issue: Affects: fedora-36 [bug 2125970]
Created bluez tracking bugs for this issue: Affects: fedora-35 [bug 2125976]
https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=e2b0f0d8d63e1223bb714a9efb37e2257818268b https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=7a80d2096f1b7125085e21448112aa02f49f5e9a https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/profiles/audio/avdtp.c?id=0388794dc5fdb73a4ea88bcf148de0a12b4364d4 https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1977968
(In reply to Sandipan Roy from comment #5) > https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/ > ?id=e2b0f0d8d63e1223bb714a9efb37e2257818268b > https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/ > ?id=7a80d2096f1b7125085e21448112aa02f49f5e9a > https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/profiles/audio/ > avdtp.c?id=0388794dc5fdb73a4ea88bcf148de0a12b4364d4 > https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1977968 Thanks, wondering do we have any reproducer for verification ? Gopal ..
No Reproducer or test cases are present.