Security Vulnerability: BleedingTooth aka CVE-2020-12351, CVE-2020-12352, and CVE-2020-24490

This document (000019735) is provided subject to the disclaimer at the end of this document.

Environment

SUSE Linux Enterprise Server 15 Service Pack 2
SUSE Linux Enterprise Server 15 Service Pack 1
SUSE Linux Enterprise Server 15
SUSE Linux Enterprise Server 12 Service Pack 5
SUSE Linux Enterprise Server 12 Service Pack 4
SUSE Linux Enterprise Server 12 Service Pack 3
SUSE Linux Enterprise Server 12 Service Pack 2

Situation

Security researchers from Google have published new attacks on Bluetooth, which allow physical close attackers to either get access to kernel information, crashing the kernel or even potentially execute code in the Linux kernel.

There are 3 separate issues listed :
 
  • CVE-2020-24490 a.k.a. "BadVibes"
A heap overflow when processing extended advertising report events could be used by physical close attackers to crash the kernel or potentially execute code.

This issue only affected SUSE Linux Enterprise 15 SP2 and was fixed (without security tagging) with our September 2020 kernel updates already.
 
  • CVE-2020-12351 a.k.a. "BadKarma"
A type confusion while processing AMP packets could be used by physical close attackers to crash the kernel or potentially execute code.

This affects SUSE Linux Enterprise 12 SP4 and newer kernels.
 
  • CVE-2020-12352 a.k.a. "BadChoice"
A stack information leak when handling certain AMP packets could be used by physical close attackers to leak information from the kernel.

This issue affects SUSE Linux Enterprise 12 SP2 and newer kernels.

Resolution

SUSE will be releasing kernel updates to address this issue.
 

Cause

Status

Security Alert

Additional Information

A potential work-around that could be applied until the fixed kernels will be released, is to disable Bluetooth.

Disclaimer

This Support Knowledgebase provides a valuable tool for SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.

  • Document ID:000019735
  • Creation Date: 15-Oct-2020
  • Modified Date:15-Oct-2020
    • SUSE Linux Enterprise Server

< Back to Support Search

For questions or concerns with the SUSE Knowledgebase please contact: tidfeedback@suse.com

SUSE Support Forums

Get your questions answered by experienced Sys Ops or interact with other SUSE community experts.

Join Our Community

Support Resources

Learn how to get the most from the technical support you receive with your SUSE Subscription, Premium Support, Academic Program, or Partner Program.


SUSE Customer Support Quick Reference Guide SUSE Technical Support Handbook Update Advisories
Support FAQ

Open an Incident

Open an incident with SUSE Technical Support, manage your subscriptions, download patches, or manage user access.

Go to Customer Center