Improper access control in subsystem could allow unauthenticated user to enable escalation of privilege and denial of service via adjacent access. Upstream Reference: https://patchwork.kernel.org/patch/11428317/ Upstream Reference: https://patchwork.kernel.org/patch/11428319/
Created bluez tracking bugs for this issue: Affects: fedora-all [bug 1814294]
External References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00352.html
Upstream patches: https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?h=5.54&id=3cccdbab2324086588df4ccf5f892fb3ce1f1787 https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?h=5.54&id=8cdbd3b09f29da29374e2f83369df24228da0ad1
Mitigation: Disable Bluetooth. Instructions on disabling bluetooth in Red Hat Enterprise Linux are available at: https://access.redhat.com/solutions/2682931
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:4001 https://access.redhat.com/errata/RHSA-2020:4001
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-0556
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:4481 https://access.redhat.com/errata/RHSA-2020:4481