First published: Mon Jan 06 2025(Updated: )
Andy Nguyen discovered that the Bluetooth L2CAP implementation in the Linux kernel contained a type-confusion error. A physically proximate remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2020-12351) Andy Nguyen discovered that the Bluetooth A2MP implementation in the Linux kernel did not properly initialize memory in some situations. A physically proximate remote attacker could use this to expose sensitive information (kernel memory). (CVE-2020-12352) Andy Nguyen discovered that the Bluetooth HCI event packet parser in the Linux kernel did not properly handle event advertisements of certain sizes, leading to a heap-based buffer overflow. A physically proximate remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2020-24490) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems:
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-5.15.0-1070-nvidia | <5.15.0-1070.71 | 5.15.0-1070.71 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1070-nvidia-lowlatency | <5.15.0-1070.71 | 5.15.0-1070.71 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1070-raspi | <5.15.0-1070.73 | 5.15.0-1070.73 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1073-oracle | <5.15.0-1073.79 | 5.15.0-1073.79 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1074-gcp | <5.15.0-1074.83 | 5.15.0-1074.83 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1076-aws | <5.15.0-1076.83 | 5.15.0-1076.83 |
=22.04 | ||
All of | ||
ubuntu/linux-image-aws-lts-22.04 | <5.15.0.1076.78 | 5.15.0.1076.78 |
=22.04 | ||
All of | ||
ubuntu/linux-image-gcp-lts-22.04 | <5.15.0.1074.70 | 5.15.0.1074.70 |
=22.04 | ||
All of | ||
ubuntu/linux-image-nvidia | <5.15.0.1070.70 | 5.15.0.1070.70 |
=22.04 | ||
All of | ||
ubuntu/linux-image-nvidia-lowlatency | <5.15.0.1070.70 | 5.15.0.1070.70 |
=22.04 | ||
All of | ||
ubuntu/linux-image-oracle-lts-22.04 | <5.15.0.1073.69 | 5.15.0.1073.69 |
=22.04 | ||
All of | ||
ubuntu/linux-image-raspi | <5.15.0.1070.68 | 5.15.0.1070.68 |
=22.04 | ||
All of | ||
ubuntu/linux-image-raspi-nolpae | <5.15.0.1070.68 | 5.15.0.1070.68 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1074-gcp | <5.15.0-1074.83~20.04.1 | 5.15.0-1074.83~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1075-aws | <5.15.0-1075.82~20.04.1 | 5.15.0-1075.82~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-130-generic | <5.15.0-130.140~20.04.1 | 5.15.0-130.140~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-130-generic-64k | <5.15.0-130.140~20.04.1 | 5.15.0-130.140~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-130-generic-lpae | <5.15.0-130.140~20.04.1 | 5.15.0-130.140~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-aws | <5.15.0.1075.82~20.04.1 | 5.15.0.1075.82~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-gcp | <5.15.0.1074.83~20.04.1 | 5.15.0.1074.83~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-generic-64k-hwe-20.04 | <5.15.0.130.140~20.04.1 | 5.15.0.130.140~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-generic-hwe-20.04 | <5.15.0.130.140~20.04.1 | 5.15.0.130.140~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-generic-lpae-hwe-20.04 | <5.15.0.130.140~20.04.1 | 5.15.0.130.140~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-oem-20.04 | <5.15.0.130.140~20.04.1 | 5.15.0.130.140~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-oem-20.04b | <5.15.0.130.140~20.04.1 | 5.15.0.130.140~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-oem-20.04c | <5.15.0.130.140~20.04.1 | 5.15.0.130.140~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-virtual-hwe-20.04 | <5.15.0.130.140~20.04.1 | 5.15.0.130.140~20.04.1 |
=20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-7179-2 is high due to the potential for remote denial of service or arbitrary code execution.
To fix USN-7179-2, upgrade your Linux kernel to the recommended versions listed in the advisory.
USN-7179-2 affects Ubuntu versions 20.04 and 22.04 using specific kernel packages.
USN-7179-2 addresses multiple vulnerabilities including CVE-2020-12351, which involves a Bluetooth L2CAP type-confusion error.
The vulnerabilities addressed in USN-7179-2 were discovered by researcher Andy Nguyen.