Stories
Slash Boxes
Comments

SoylentNews is people

Submission Preview

No link to story available

BleedingTooth: critical kernel Bluetooth vulnerability

Accepted submission by Anonymous Coward at 2020-10-14 20:11:08
Security

BlueZ Advisory: Severity rating, HIGH - All Linux kernel versions before 5.9 that support BlueZ

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html [intel.com]
https://web.archive.org/web/20201014200119/https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html [archive.org]
https://lwn.net/Articles/834297/#Comments [lwn.net]

The latest security information on IntelĀ® products.
BlueZ Advisory
Intel ID: INTEL-SA-00435
Advisory Category: Software
Impact of vulnerability: Escalation of Privilege, Information Disclosure
Severity rating: HIGH
Original release: 10/13/2020
Last revised: 10/13/2020
Show more Show less View all
Summary:

Potential security vulnerabilities in BlueZ may allow escalation of privilege or information disclosure. BlueZ is releasing Linux kernel fixes to address these potential vulnerabilities.
Vulnerability Details:

CVEID: CVE-2020-12351

Description: Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

CVSS Base Score: 8.3 High

CVSS Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

CVEID: CVE-2020-12352

Description: Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.

CVSS Base Score: 5.3 Medium

CVSS Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

CVEID: CVE-2020-24490

Description: Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access.

CVSS Base Score: 5.3 Medium

CVSS Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

All Linux kernel versions before 5.9 that support BlueZ.
Recommendations:

Intel recommends updating the Linux kernel to version 5.9 or later.

If a kernel upgrade is not possible, Intel recommends instead installing the following kernel fixes to address these issues:

https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/ [kernel.org]

https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-2-luiz.dentz@gmail.com/ [kernel.org]

https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-3-luiz.dentz@gmail.com/ [kernel.org]

https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-4-luiz.dentz@gmail.com/ [kernel.org]

https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=a2ec905d1e160a33b2e210e45ad30445ef26ce0e [kernel.org]

Acknowledgements:

Intel would like to thank Andy Nguyen, security engineer from Google for reporting these issues.

Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.
Revision History
Revision Date Description
1.0 10/13/2020 Initial Release

-----------------
http://www.bluez.org/ [bluez.org]
https://github.com/google/security-research/security/advisories/GHSA-h637-c88j-47wq [github.com]
https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq [github.com]
https://github.com/google/security-research/security/advisories/GHSA-ccx2-w2r4-x649 [github.com]


Original Submission