Unrated severityNVD Advisory· Published Feb 2, 2021· Updated Aug 4, 2024
CVE-2020-24490
CVE-2020-24490
Description
Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.
Affected products
70- osv-coords69 versionspkg:apk/chainguard/bluezpkg:apk/chainguard/bluez-btmgmtpkg:apk/chainguard/bluez-btmonpkg:apk/chainguard/bluez-cupspkg:apk/chainguard/bluez-dbgpkg:apk/chainguard/bluez-devpkg:apk/chainguard/bluez-docpkg:apk/chainguard/bluez-meshctlpkg:apk/chainguard/bluez-pluginspkg:apk/wolfi/bluezpkg:apk/wolfi/bluez-btmgmtpkg:apk/wolfi/bluez-btmonpkg:apk/wolfi/bluez-cupspkg:apk/wolfi/bluez-dbgpkg:apk/wolfi/bluez-devpkg:apk/wolfi/bluez-docpkg:apk/wolfi/bluez-meshctlpkg:apk/wolfi/bluez-pluginspkg:rpm/opensuse/kernel-debug&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/kernel-default-base&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/kernel-default&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/kernel-docs&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/kernel-kvmsmall&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/kernel-obs-build&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/kernel-obs-qa&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/kernel-preempt&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/kernel-rt_debug&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/kernel-rt&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/kernel-source&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/kernel-source-rt&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/kernel-syms&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/kernel-syms-rt&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/sca-patterns-base&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/sca-patterns-hae&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/sca-patterns-sle11&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/sca-patterns-sle12&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/sca-patterns-sle15&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/sca-patterns-suma&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/sca-server-report&distro=openSUSE%20Leap%2015.3pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP2pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2015%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP2pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP2pkg:rpm/suse/kernel-livepatch-SLE15-SP2_Update_0&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP2pkg:rpm/suse/kernel-livepatch-SLE15-SP2_Update_1&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP2pkg:rpm/suse/kernel-livepatch-SLE15-SP2_Update_5&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP2pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP2pkg:rpm/suse/kernel-preempt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP2pkg:rpm/suse/kernel-preempt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP2pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Real%20Time%20Module%2015%20SP2pkg:rpm/suse/kernel-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP2pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP2pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP2pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP2pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP2pkg:rpm/suse/sca-patterns-base&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP3pkg:rpm/suse/sca-patterns-hae&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP3pkg:rpm/suse/sca-patterns-sle11&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP3pkg:rpm/suse/sca-patterns-sle12&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP3pkg:rpm/suse/sca-patterns-sle15&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP3pkg:rpm/suse/sca-patterns-suma&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP3pkg:rpm/suse/sca-server-report&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP3
< 0+ 68 more
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 5.3.18-lp152.47.2
- (no CPE)range: < 5.3.18-lp152.50.1.lp152.8.10.1
- (no CPE)range: < 5.3.18-lp152.47.2
- (no CPE)range: < 5.3.18-lp152.47.1
- (no CPE)range: < 5.3.18-lp152.47.2
- (no CPE)range: < 5.3.18-lp152.47.2
- (no CPE)range: < 5.3.18-lp152.47.1
- (no CPE)range: < 5.3.18-lp152.47.2
- (no CPE)range: < 5.3.18-lp152.3.5.1
- (no CPE)range: < 5.3.18-lp152.3.5.1
- (no CPE)range: < 5.3.18-lp152.47.2
- (no CPE)range: < 5.3.18-lp152.3.5.1
- (no CPE)range: < 5.3.18-lp152.47.1
- (no CPE)range: < 5.3.18-lp152.3.5.1
- (no CPE)range: < 1.5.0-150300.10.3.1
- (no CPE)range: < 1.5.1-150300.10.3.1
- (no CPE)range: < 1.5.1-150300.18.3.1
- (no CPE)range: < 1.5.1-150300.3.3.1
- (no CPE)range: < 1.5.1-150300.14.3.1
- (no CPE)range: < 1.5.0-150300.9.3.1
- (no CPE)range: < 1.5.1-150300.11.3.1
- (no CPE)range: < 5.3.18-18.24.1
- (no CPE)range: < 5.3.18-24.29.2.9.9.3
- (no CPE)range: < 5.3.18-24.29.2
- (no CPE)range: < 5.3.18-24.29.2
- (no CPE)range: < 5.3.18-24.29.2
- (no CPE)range: < 5.3.18-24.29.2
- (no CPE)range: < 5.3.18-24.29.2
- (no CPE)range: < 5.3.18-24.29.2
- (no CPE)range: < 4-11.2
- (no CPE)range: < 4-2.1
- (no CPE)range: < 1-5.3.3
- (no CPE)range: < 5.3.18-24.29.2
- (no CPE)range: < 5.3.18-24.29.2
- (no CPE)range: < 5.3.18-24.29.2
- (no CPE)range: < 5.3.18-16.1
- (no CPE)range: < 5.3.18-16.1
- (no CPE)range: < 5.3.18-18.24.1
- (no CPE)range: < 5.3.18-24.29.2
- (no CPE)range: < 5.3.18-24.29.2
- (no CPE)range: < 5.3.18-16.1
- (no CPE)range: < 5.3.18-18.24.1
- (no CPE)range: < 5.3.18-24.29.2
- (no CPE)range: < 5.3.18-16.1
- (no CPE)range: < 1.5.0-150300.10.3.1
- (no CPE)range: < 1.5.1-150300.10.3.1
- (no CPE)range: < 1.5.1-150300.18.3.1
- (no CPE)range: < 1.5.1-150300.3.3.1
- (no CPE)range: < 1.5.1-150300.14.3.1
- (no CPE)range: < 1.5.0-150300.9.3.1
- (no CPE)range: < 1.5.1-150300.11.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.htmlmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.