NULL Pointer Dereference Affecting bluez-cups package, versions <0:5.62-2.amzn2023.0.4


Severity

Recommended
low

Based on Amazon Linux security rating.

Threat Intelligence

EPSS
0.04% (15th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about NULL Pointer Dereference vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-AMZN2023-BLUEZCUPS-5788982
  • published20 Jul 2023
  • disclosed17 Oct 2022

Introduced: 17 Oct 2022

CVE-2022-3563  (opens in a new tab)
CWE-476  (opens in a new tab)

How to fix?

Upgrade Amazon-Linux:2023 bluez-cups to version 0:5.62-2.amzn2023.0.4 or higher.
This issue was patched in ALAS2023-2023-262.

NVD Description

Note: Versions mentioned in the description apply only to the upstream bluez-cups package and not the bluez-cups package as distributed by Amazon-Linux. See How to fix? for Amazon-Linux:2023 relevant fixed versions and status.

A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function read_50_controller_cap_complete of the file tools/mgmt-tester.c of the component BlueZ. The manipulation of the argument cap_len leads to null pointer dereference. It is recommended to apply a patch to fix this issue. VDB-211086 is the identifier assigned to this vulnerability.

CVSS Scores

version 3.1