Lucene search

K
archlinuxArchLinuxASA-202010-4
HistoryOct 18, 2020 - 12:00 a.m.

[ASA-202010-4] linux-lts: multiple issues

2020-10-1800:00:00
security.archlinux.org
39
linux-lts
multiple issues
high-severity
upgrade
version 5.4.72-1
cve-2020-12351
cve-2020-12352
cve-2020-24490
privilege escalation
information disclosure
denial of service
bluetooth
vulnerability
data confidentiality
integrity
system availability
remote attacker
adjacent range
arbitrary code
bluetooth packet
heap buffer overflow
remote unauthenticated attacker

CVSS2

5.8

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:L/Au:N/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

70.1%

Arch Linux Security Advisory ASA-202010-4

Severity: High
Date : 2020-10-18
CVE-ID : CVE-2020-12351 CVE-2020-12352 CVE-2020-24490
Package : linux-lts
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-1250

Summary

The package linux-lts before version 5.4.72-1 is vulnerable to multiple
issues including information disclosure, privilege escalation and
denial of service.

Resolution

Upgrade to 5.4.72-1.

pacman -Syu “linux-lts>=5.4.72-1”

The problems have been fixed upstream in version 5.4.72.

Workaround

None.

Description

  • CVE-2020-12351 (privilege escalation)

A flaw was found in the way the Linux kernel Bluetooth implementation
handled L2CAP packets with A2MP CID. A remote attacker in adjacent
range could use this flaw to crash the system causing denial of service
or potentially execute arbitrary code on the system by sending a
specially crafted L2CAP packet. The highest threat from this
vulnerability is to data confidentiality and integrity as well as
system availability.

  • CVE-2020-12352 (information disclosure)

An information leak flaw was found in the way the Linux kernel’s
Bluetooth stack implementation handled initialization of stack memory
when handling certain AMP packets. A remote attacker in adjacent range
could use this flaw to leak small portions of stack memory on the
system by sending a specially crafted AMP packets. The highest threat
from this vulnerability is to data confidentiality.

  • CVE-2020-24490 (denial of service)

A heap buffer overflow flaw was found in the way the Linux kernel’s
Bluetooth implementation processed extended advertising report events.
This flaw allows a remote attacker in an adjacent range to crash the
system, causing a denial of service or to potentially execute arbitrary
code on the system by sending a specially crafted Bluetooth packet. The
highest threat from this vulnerability is to confidentiality,
integrity, as well as system availability.

Impact

A remote unauthenticated attacker in range is able to execute arbitrary
code, disclose information or DoS the system through bluetooth.

References

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html
https://github.com/google/security-research/security/advisories/GHSA-h637-c88j-47wq
https://lore.kernel.org/linux-bluetooth/[email protected]/
https://lore.kernel.org/linux-bluetooth/[email protected]/
https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq
https://github.com/google/security-research/security/advisories/GHSA-ccx2-w2r4-x649
https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=a2ec905d1e160a33b2e210e45ad30445ef26ce0e
https://security.archlinux.org/CVE-2020-12351
https://security.archlinux.org/CVE-2020-12352
https://security.archlinux.org/CVE-2020-24490

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanylinux-lts< 5.4.72-1UNKNOWN

CVSS2

5.8

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:L/Au:N/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

70.1%