Project:Security/Vulnerabilities/BleedingTooth vulnerability

Summary
Gentoo Linux has been made aware of a vulnerability in Linux bluetooth stack (BlueZ), requiring updates to the Linux kernel.

CVE-2020-12351
A flaw was found in the way the Linux kernel Bluetooth implementation handled L2CAP packets with A2MP CID. A remote attacker in adjacent range could use this flaw to crash the system causing denial of service or potentially execute arbitrary code on the system by sending a specially crafted L2CAP packet.

CVE-2020-12352
An information leak flaw was found in the way Linux kernel Bluetooth stack implementation handled initialization of stack memory when handling certain AMP packets. A remote attacker in adjacent range could use this flaw to leak small portions of stack memory on the system by sending a specially crafted AMP packets.

CVE-2020-24490
A heap buffer overflow flaw was found in the way the Linux kernel Bluetooth implementation processed extended advertising report events. A remote attacker in adjacent range could use this flaw to crash the system causing denial of service or potentially execute arbitrary code on the system by sending a specially crafted Bluetooth packet.

Resolution
If you do not use Bluetooth, the viable mitigation is to disable Bluetooth on the system.

If you require Bluetooth support, there is no known complete mitigation other than updating the kernel and rebooting the system.

Kernel updates
You can subscribe to bug to get notified.