| Name | CVE-2022-39176 | 
| Description | BlueZ before 5.59 allows physically proximate attackers to obtain sensitive information because profiles/audio/avrcp.c does not validate params_len. | 
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) | 
| References | DLA-3157-1, DLA-3879-1 | 
Vulnerable and fixed packages
The table below lists information on source packages.
| Source Package | Release | Version | Status | 
|---|
| bluez (PTS) | bullseye | 5.55-3.1+deb11u1 | vulnerable | 
|  | bullseye (security) | 5.55-3.1+deb11u2 | fixed | 
|  | bookworm | 5.66-1+deb12u2 | fixed | 
|  | bookworm (security) | 5.66-1+deb12u1 | fixed | 
|  | trixie | 5.82-1.1 | fixed | 
|  | forky, sid | 5.84-1 | fixed | 
The information below is based on the following data on fixed versions.
Notes
https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=e2b0f0d8d63e1223bb714a9efb37e2257818268b (5.59)
https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=7a80d2096f1b7125085e21448112aa02f49f5e9a (5.59)
https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=0388794dc5fdb73a4ea88bcf148de0a12b4364d4 (5.60)
https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=e21680c9355a0f9d5ef6d4a5ae032de274e87b37 (5.61)
https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1977968