Andy Nguyen discovered that the Bluetooth L2CAP implementation in the Linux
kernel contained a type-confusion error. A physically proximate remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2020-12351)
Andy Nguyen discovered that the Bluetooth A2MP implementation in the Linux
kernel did not properly initialize memory in some situations. A physically
proximate remote attacker could use this to expose sensitive information
(kernel memory). (CVE-2020-12352)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 20.04 | noarch | linux-image-5.4.0-1022-raspi | < 5.4.0-1022.25 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-buildinfo-5.4.0-1022-raspi | < 5.4.0-1022.25 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-headers-5.4.0-1022-raspi | < 5.4.0-1022.25 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-image-5.4.0-1022-raspi-dbgsym | < 5.4.0-1022.25 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-modules-5.4.0-1022-raspi | < 5.4.0-1022.25 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-raspi-headers-5.4.0-1022 | < 5.4.0-1022.25 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-raspi-tools-5.4.0-1022 | < 5.4.0-1022.25 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-tools-5.4.0-1022-raspi | < 5.4.0-1022.25 | UNKNOWN |
Ubuntu | 20.04 | noarch | linux-image-5.4.0-52-generic | < 5.4.0-52.57 | UNKNOWN |
Ubuntu | 20.04 | noarch | kernel-signed-image-5.4.0-52-generic-di | < 5.4.0-52.57 | UNKNOWN |