Potential security vulnerabilities in BlueZ may allow escalation of privilege or information disclosure.** **BlueZ is releasing Linux kernel fixes to address these potential vulnerabilities.
CVEID: CVE-2020-12351
Description: Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
CVSS Base Score: 8.3 High
CVSS Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
CVEID: CVE-2020-12352
Description: Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.
CVSS Base Score: 5.3 Medium
CVSS Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVEID: CVE-2020-24490
Description: Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access.
CVSS Base Score: 5.3 Medium
CVSS Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
All Linux kernel versions that support BlueZ.
Intel recommends installing the following kernel fixes to address these issues:
<https://lore.kernel.org/linux-bluetooth/[email protected]/>
<https://lore.kernel.org/linux-bluetooth/[email protected]/>
<https://lore.kernel.org/linux-bluetooth/[email protected]/>
<https://lore.kernel.org/linux-bluetooth/[email protected]/>
Intel would like to thank Andy Nguyen, security engineer from Google for reporting these issues.
Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.