SUSE Releases Fixes for BleedingTooth Vulnerabilities
Yesterday evening, Google and Intel published a new set of software vulnerabilities that affect machines running Linux Kernels that use Bluetooth.
The set of vulnerabilities, called BleedingTooth, impact SUSE Linux Enterprise systems with enabled Bluetooth hardware.
There are 3 separate issues bundled into this set:
- CVE-2020-24490 (BadVibes): A heap overflow when processing extended advertising report events from Bluetooth devices could be used by physical close attackers to crash the kernel or potentially execute code.
This issue only affected SUSE Linux Enterprise 15 SP2 and was fixed (without security tagging) with our September 2020 kernel updates already.
- CVE-2020-12351 (BadKarma): A type confusion while processing AMP packets could be used by physical close attackers to crash the kernel or potentially execute code.
This issue affects SUSE Linux Enterprise 12 SP4 and newer kernels and will be fixed with updates in the next days.
- CVE-2020-12352 (BadChoice): A stack information leak when handling certain AMP packets could be used by physical close attackers to leak information from the kernel.
This issue affects SUSE Linux Enterprise 12 SP2 and newer kernels and will be fixed with updates in the next days.
Fixes for affected SUSE Linux Enterprise products be released in the next days and will be available here, along with additional technical details:
BleedingTooth, while potentially serious to unpatched systems, poses little danger to those who keep their SUSE Linux Enterprise Server patched and up to date. We have released and are releasing updates to all affected versions, eliminating the potential for disruption.
If you have any questions or concerns, please reach out to your SUSE contact. Security and reliability continue to be top priorities for SUSE because they are top priorities for our customers and partners. And as always, customers and partners come first.