First published: Tue Oct 20 2020(Updated: )
Andy Nguyen discovered that the Bluetooth L2CAP implementation in the Linux kernel contained a type-confusion error. A physically proximate remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2020-12351) Andy Nguyen discovered that the Bluetooth A2MP implementation in the Linux kernel did not properly initialize memory in some situations. A physically proximate remote attacker could use this to expose sensitive information (kernel memory). (CVE-2020-12352) Andy Nguyen discovered that the Bluetooth HCI event packet parser in the Linux kernel did not properly handle event advertisements of certain sizes, leading to a heap-based buffer overflow. A physically proximate remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2020-24490)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-5.0.0-1070-oem-osp1 | <5.0.0-1070.76 | 5.0.0-1070.76 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-5.3.0-1036-raspi2 | <5.3.0-1036.38 | 5.3.0-1036.38 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-oem-osp1 | <5.0.0.1070.68 | 5.0.0.1070.68 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-raspi2-hwe-18.04 | <5.3.0.1036.25 | 5.3.0.1036.25 |
Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of CVE-2020-12351 is high.
A physically proximate remote attacker can exploit CVE-2020-12351 to cause a denial of service (system crash) or possibly execute arbitrary code.
To fix CVE-2020-12351, update the affected Linux kernel to version 5.0.0-1070.76 or later.