vulnerability
Ubuntu: (Multiple Advisories) (CVE-2020-24490): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
3 | (AV:A/AC:L/Au:N/C:N/I:N/A:P) | Oct 20, 2020 | Oct 20, 2020 | Jan 30, 2025 |
Severity
3
CVSS
(AV:A/AC:L/Au:N/C:N/I:N/A:P)
Published
Oct 20, 2020
Added
Oct 20, 2020
Modified
Jan 30, 2025
Description
Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.
Solution(s)
ubuntu-upgrade-linux-image-4-4-0-262-genericubuntu-upgrade-linux-image-4-4-0-262-lowlatencyubuntu-upgrade-linux-image-5-0-0-1070-oem-osp1ubuntu-upgrade-linux-image-5-15-0-1041-xilinx-zynqmpubuntu-upgrade-linux-image-5-15-0-1057-gkeopubuntu-upgrade-linux-image-5-15-0-1067-ibmubuntu-upgrade-linux-image-5-15-0-1070-nvidiaubuntu-upgrade-linux-image-5-15-0-1070-nvidia-lowlatencyubuntu-upgrade-linux-image-5-15-0-1070-raspiubuntu-upgrade-linux-image-5-15-0-1071-intel-iotgubuntu-upgrade-linux-image-5-15-0-1071-kvmubuntu-upgrade-linux-image-5-15-0-1072-gkeubuntu-upgrade-linux-image-5-15-0-1072-oracleubuntu-upgrade-linux-image-5-15-0-1073-oracleubuntu-upgrade-linux-image-5-15-0-1074-gcpubuntu-upgrade-linux-image-5-15-0-1075-awsubuntu-upgrade-linux-image-5-15-0-1076-awsubuntu-upgrade-linux-image-5-15-0-1078-azureubuntu-upgrade-linux-image-5-15-0-128-lowlatencyubuntu-upgrade-linux-image-5-15-0-128-lowlatency-64kubuntu-upgrade-linux-image-5-15-0-130-genericubuntu-upgrade-linux-image-5-15-0-130-generic-64kubuntu-upgrade-linux-image-5-15-0-130-generic-lpaeubuntu-upgrade-linux-image-5-3-0-1036-raspi2ubuntu-upgrade-linux-image-5-6-0-1048-oemubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-lts-22-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-cvmubuntu-upgrade-linux-image-azure-lts-22-04ubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-lts-22-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-hwe-20-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-5-15ubuntu-upgrade-linux-image-gkeopubuntu-upgrade-linux-image-gkeop-5-15ubuntu-upgrade-linux-image-ibmubuntu-upgrade-linux-image-intelubuntu-upgrade-linux-image-intel-iotgubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-64kubuntu-upgrade-linux-image-lowlatency-64k-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-nvidiaubuntu-upgrade-linux-image-nvidia-lowlatencyubuntu-upgrade-linux-image-oem-20-04ubuntu-upgrade-linux-image-oem-20-04bubuntu-upgrade-linux-image-oem-20-04cubuntu-upgrade-linux-image-oem-20-04dubuntu-upgrade-linux-image-oem-osp1ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-22-04ubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-raspi2-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-20-04ubuntu-upgrade-linux-image-virtual-lts-xenialubuntu-upgrade-linux-image-xilinx-zynqmp
References
- CVE-2020-24490
- https://attackerkb.com/topics/CVE-2020-24490
- NVD-CVE-2020-24490
- UBUNTU-USN-4525-1
- UBUNTU-USN-4527-1
- UBUNTU-USN-4576-1
- UBUNTU-USN-4578-1
- UBUNTU-USN-4579-1
- UBUNTU-USN-4592-1
- UBUNTU-USN-4657-1
- UBUNTU-USN-4658-1
- UBUNTU-USN-4659-1
- UBUNTU-USN-4660-1
- UBUNTU-USN-4679-1
- UBUNTU-USN-4680-1
- UBUNTU-USN-4710-1
- UBUNTU-USN-4711-1
- UBUNTU-USN-4748-1
- UBUNTU-USN-4749-1
- UBUNTU-USN-4750-1
- UBUNTU-USN-4751-1
- UBUNTU-USN-4752-1
- UBUNTU-USN-5130-1
- UBUNTU-USN-7179-1
- UBUNTU-USN-7179-2
- UBUNTU-USN-7179-3
- UBUNTU-USN-7179-4
- UBUNTU-USN-7183-1
- UBUNTU-USN-7186-1
- UBUNTU-USN-7186-2
- UBUNTU-USN-7194-1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.