High
Updates are available to mitigate a serious flaw Google found in the Linux Bluetooth stack. A high-severity flaw was found in the Bluetooth stack in the Linux kernel versions below Linux 5.9 that support BlueZ. Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. BlueZ is found on Linux-based IoT devices and is the official Linux Bluetooth stack. Potential security vulnerabilities in BlueZ may allow escalation of privilege or information disclosure.BlueZ is releasing Linux kernel fixes to address these potential vulnerabilities.
CVE-2020-12351 – Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
CVE-2020-12352 – Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.
CVE-2020-24490 – Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Linux
All Linux kernel versions before 5.10 that support BlueZ.
Intel recommends updating the Linux kernel to version 5.10 or later.
If a kernel upgrade is not possible, Intel recommends the following kernel fixes to address these issues: