Summary: | kernel: net: bluetooth: BleedingTooth | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Thomas Deutschmann (RETIRED) <whissi> |
Component: | Kernel | Assignee: | Gentoo Kernel Security <security-kernel> |
Status: | RESOLVED FIXED | ||
Severity: | blocker | CC: | hydrapolic, phmagic |
Priority: | Highest | Keywords: | CC-ARCHES, STABLEREQ |
Version: | unspecified | Flags: | nattka:
sanity-check+
|
Hardware: | All | ||
OS: | Linux | ||
URL: | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html | ||
See Also: | https://bugs.gentoo.org/show_bug.cgi?id=749285 | ||
Whiteboard: | A0 [] | ||
Package list: |
sys-kernel/gentoo-sources-4.4.240
sys-kernel/gentoo-sources-4.9.240
sys-kernel/gentoo-sources-4.14.202
sys-kernel/gentoo-sources-4.19.152
sys-kernel/gentoo-sources-5.4.72
|
Runtime testing required: | --- |
Bug Depends on: | 749837 | ||
Bug Blocks: |
Description
Thomas Deutschmann (RETIRED)
2020-10-15 15:22:05 UTC
CVE-2020-12351: =============== A flaw was found in the way the Linux kernel Bluetooth implementation handled L2CAP packets with A2MP CID. A remote attacker in adjacent range could use this flaw to crash the system causing denial of service or potentially execute arbitrary code on the system by sending a specially crafted L2CAP packet. CVE-2020-12352: =============== An information leak flaw was found in the way Linux kernel Bluetooth stack implementation handled initialization of stack memory when handling certain AMP packets. A remote attacker in adjacent range could use this flaw to leak small portions of stack memory on the system by sending a specially crafted AMP packets. CVE-2020-24490: =============== A heap buffer overflow flaw was found in the way the Linux kernel Bluetooth implementation processed extended advertising report events. A remote attacker in adjacent range could use this flaw to crash the system causing denial of service or potentially execute arbitrary code on the system by sending a specially crafted Bluetooth packet. Patches landed in
>=sys-kernel/gentoo-sources-4.4.240
>=sys-kernel/gentoo-sources-4.9.240
>=sys-kernel/gentoo-sources-4.14.202
>=sys-kernel/gentoo-sources-4.19.152
>=sys-kernel/gentoo-sources-5.4.72
>=sys-kernel/gentoo-sources-5.8.16
>=sys-kernel/gentoo-sources-5.9.1
Note to binary kernel users: The distro kernel is based on same gentoo-sources and therefore not explicitly mentioned.
We are currently checking for regressions and will hopefully start stabilization soon.
Unable to check for sanity:
> dependent bug #749837 is missing keywords
All sanity-check issues have been resolved x86 stable amd64 stable arm64 stable Looking good on ppc. See https://pastebin.com/HGFJjVXh for a successful boot on a G4 DP. Looking good on ppc64. See https://pastebin.com/dPAavz6A for a successful boot dmesg on a Talos II. (In reply to ernsteiswuerfel from comment #9) > Looking good on ppc64. > > See https://pastebin.com/dPAavz6A for a successful boot dmesg on a Talos II. Brilliant, thank you! ppc{,64} stable arm, hppa and sparc marked stable under kernel project policy. |