ID CVE-2020-25661
Summary A Red Hat only CVE-2020-12351 regression issue was found in the way the Linux kernel's Bluetooth implementation handled L2CAP packets with A2MP CID. This flaw allows a remote attacker in an adjacent range to crash the system, causing a denial of service or potentially executing arbitrary code on the system by sending a specially crafted L2CAP packet. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
References
Vulnerable Configurations
  • cpe:2.3:o:redhat:enterprise_linux:8.3:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:8.3:*:*:*:*:*:*:*
CVSS
Base: 8.3 (as of 12-02-2023 - 23:40)
Impact:
Exploitability:
CWE CWE-843
CAPEC
Access
VectorComplexityAuthentication
ADJACENT_NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:A/AC:L/Au:N/C:C/I:C/A:C
redhat via4
rpms
  • bpftool-0:4.18.0-240.1.1.el8_3
  • bpftool-debuginfo-0:4.18.0-240.1.1.el8_3
  • kernel-0:4.18.0-240.1.1.el8_3
  • kernel-abi-whitelists-0:4.18.0-240.1.1.el8_3
  • kernel-core-0:4.18.0-240.1.1.el8_3
  • kernel-cross-headers-0:4.18.0-240.1.1.el8_3
  • kernel-debug-0:4.18.0-240.1.1.el8_3
  • kernel-debug-core-0:4.18.0-240.1.1.el8_3
  • kernel-debug-debuginfo-0:4.18.0-240.1.1.el8_3
  • kernel-debug-devel-0:4.18.0-240.1.1.el8_3
  • kernel-debug-modules-0:4.18.0-240.1.1.el8_3
  • kernel-debug-modules-extra-0:4.18.0-240.1.1.el8_3
  • kernel-debuginfo-0:4.18.0-240.1.1.el8_3
  • kernel-debuginfo-common-aarch64-0:4.18.0-240.1.1.el8_3
  • kernel-debuginfo-common-ppc64le-0:4.18.0-240.1.1.el8_3
  • kernel-debuginfo-common-s390x-0:4.18.0-240.1.1.el8_3
  • kernel-debuginfo-common-x86_64-0:4.18.0-240.1.1.el8_3
  • kernel-devel-0:4.18.0-240.1.1.el8_3
  • kernel-doc-0:4.18.0-240.1.1.el8_3
  • kernel-headers-0:4.18.0-240.1.1.el8_3
  • kernel-modules-0:4.18.0-240.1.1.el8_3
  • kernel-modules-extra-0:4.18.0-240.1.1.el8_3
  • kernel-tools-0:4.18.0-240.1.1.el8_3
  • kernel-tools-debuginfo-0:4.18.0-240.1.1.el8_3
  • kernel-tools-libs-0:4.18.0-240.1.1.el8_3
  • kernel-tools-libs-devel-0:4.18.0-240.1.1.el8_3
  • kernel-zfcpdump-0:4.18.0-240.1.1.el8_3
  • kernel-zfcpdump-core-0:4.18.0-240.1.1.el8_3
  • kernel-zfcpdump-debuginfo-0:4.18.0-240.1.1.el8_3
  • kernel-zfcpdump-devel-0:4.18.0-240.1.1.el8_3
  • kernel-zfcpdump-modules-0:4.18.0-240.1.1.el8_3
  • kernel-zfcpdump-modules-extra-0:4.18.0-240.1.1.el8_3
  • perf-0:4.18.0-240.1.1.el8_3
  • perf-debuginfo-0:4.18.0-240.1.1.el8_3
  • python3-perf-0:4.18.0-240.1.1.el8_3
  • python3-perf-debuginfo-0:4.18.0-240.1.1.el8_3
  • kernel-rt-0:4.18.0-240.1.1.rt7.55.el8_3
  • kernel-rt-core-0:4.18.0-240.1.1.rt7.55.el8_3
  • kernel-rt-debug-0:4.18.0-240.1.1.rt7.55.el8_3
  • kernel-rt-debug-core-0:4.18.0-240.1.1.rt7.55.el8_3
  • kernel-rt-debug-debuginfo-0:4.18.0-240.1.1.rt7.55.el8_3
  • kernel-rt-debug-devel-0:4.18.0-240.1.1.rt7.55.el8_3
  • kernel-rt-debug-kvm-0:4.18.0-240.1.1.rt7.55.el8_3
  • kernel-rt-debug-modules-0:4.18.0-240.1.1.rt7.55.el8_3
  • kernel-rt-debug-modules-extra-0:4.18.0-240.1.1.rt7.55.el8_3
  • kernel-rt-debuginfo-0:4.18.0-240.1.1.rt7.55.el8_3
  • kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.1.1.rt7.55.el8_3
  • kernel-rt-devel-0:4.18.0-240.1.1.rt7.55.el8_3
  • kernel-rt-kvm-0:4.18.0-240.1.1.rt7.55.el8_3
  • kernel-rt-modules-0:4.18.0-240.1.1.rt7.55.el8_3
  • kernel-rt-modules-extra-0:4.18.0-240.1.1.rt7.55.el8_3
refmap via4
confirm
Last major update 12-02-2023 - 23:40
Published 05-11-2020 - 21:15
Last modified 12-02-2023 - 23:40
Back to Top