vulnerability

Ubuntu: (Multiple Advisories) (CVE-2020-10135): Linux kernel vulnerabilities

Severity
5
CVSS
(AV:A/AC:L/Au:N/C:P/I:P/A:N)
Published
May 19, 2020
Added
Dec 2, 2020
Modified
Aug 18, 2025

Description

Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.

Solutions

ubuntu-upgrade-linux-image-4-15-0-1062-oracleubuntu-upgrade-linux-image-4-15-0-1077-gkeubuntu-upgrade-linux-image-4-15-0-1077-raspi2ubuntu-upgrade-linux-image-4-15-0-1082-kvmubuntu-upgrade-linux-image-4-15-0-1091-awsubuntu-upgrade-linux-image-4-15-0-1091-gcpubuntu-upgrade-linux-image-4-15-0-1094-snapdragonubuntu-upgrade-linux-image-4-15-0-1103-azureubuntu-upgrade-linux-image-4-15-0-129-genericubuntu-upgrade-linux-image-4-15-0-129-generic-lpaeubuntu-upgrade-linux-image-4-15-0-129-lowlatencyubuntu-upgrade-linux-image-4-4-0-1082-awsubuntu-upgrade-linux-image-4-4-0-1084-kvmubuntu-upgrade-linux-image-4-4-0-1118-awsubuntu-upgrade-linux-image-4-4-0-1142-raspi2ubuntu-upgrade-linux-image-4-4-0-1146-snapdragonubuntu-upgrade-linux-image-4-4-0-197-genericubuntu-upgrade-linux-image-4-4-0-197-generic-lpaeubuntu-upgrade-linux-image-4-4-0-197-lowlatencyubuntu-upgrade-linux-image-4-4-0-197-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-197-powerpc-smpubuntu-upgrade-linux-image-4-4-0-197-powerpc64-embubuntu-upgrade-linux-image-4-4-0-197-powerpc64-smpubuntu-upgrade-linux-image-5-4-0-1023-raspiubuntu-upgrade-linux-image-5-4-0-1028-kvmubuntu-upgrade-linux-image-5-4-0-1030-awsubuntu-upgrade-linux-image-5-4-0-1030-gcpubuntu-upgrade-linux-image-5-4-0-1030-oracleubuntu-upgrade-linux-image-5-4-0-1032-azureubuntu-upgrade-linux-image-5-4-0-56-genericubuntu-upgrade-linux-image-5-4-0-56-generic-lpaeubuntu-upgrade-linux-image-5-4-0-56-lowlatencyubuntu-upgrade-linux-image-5-6-0-1048-oemubuntu-upgrade-linux-image-5-8-0-1008-raspiubuntu-upgrade-linux-image-5-8-0-1008-raspi-nolpaeubuntu-upgrade-linux-image-5-8-0-1011-kvmubuntu-upgrade-linux-image-5-8-0-1011-oracleubuntu-upgrade-linux-image-5-8-0-1012-gcpubuntu-upgrade-linux-image-5-8-0-1013-azureubuntu-upgrade-linux-image-5-8-0-1014-awsubuntu-upgrade-linux-image-5-8-0-31-genericubuntu-upgrade-linux-image-5-8-0-31-generic-64kubuntu-upgrade-linux-image-5-8-0-31-generic-lpaeubuntu-upgrade-linux-image-5-8-0-31-lowlatencyubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-hweubuntu-upgrade-linux-image-aws-lts-18-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-lts-18-04ubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-lts-18-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-hwe-18-04ubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-4-15ubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oem-20-04ubuntu-upgrade-linux-image-oem-osp1ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-18-04ubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-hwe-18-04ubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-hwe-20-04ubuntu-upgrade-linux-image-virtual-lts-xenial

References

    Title
    NEW

    Explore Exposure Command

    Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.