First published: Tue Feb 02 2021(Updated: )
Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.
Credit: secure@intel.com secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
BlueZ BlueZ | ||
Linux Linux kernel | >=4.19<4.19.137 | |
Linux Linux kernel | >=4.20<5.4.56 | |
Linux Linux kernel | >=5.5.0<5.7.13 | |
Linux Linux kernel | =5.8 | |
Linux Linux kernel | =5.9 | |
All of | ||
BlueZ BlueZ | ||
Any of | ||
Linux Linux kernel | >=4.19<4.19.137 | |
Linux Linux kernel | >=4.20<5.4.56 | |
Linux Linux kernel | >=5.5.0<5.7.13 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-24490 is a vulnerability that involves improper buffer restrictions in BlueZ, which may allow an unauthenticated user to potentially enable denial of service via adjacent access.
All Linux kernel versions that support BlueZ are affected by CVE-2020-24490.
An unauthenticated user can potentially enable denial of service by leveraging the improper buffer restrictions in BlueZ.
Yes, remedies are available. For Ubuntu users, updating to Linux kernel version 5.8 or later can mitigate this vulnerability.
You can find more information about CVE-2020-24490 on the Intel Security Center, Launchpad, and MITRE CVE websites.