First published: Fri Sep 08 2017(Updated: )
An attacker within bluetooth transmission range can cause a stack buffer overflow in the Bluetooth system of the Linux kernel while processing pending L2CAP configuration responses from a client. An unauthenticated user able to connect to a system via Bluetooth could use this flaw to potentially execute arbitrary code with root privileges on the system. External References: <a href="https://www.armis.com/blueborne/">https://www.armis.com/blueborne/</a> <a href="https://access.redhat.com/security/vulnerabilities/blueborne">https://access.redhat.com/security/vulnerabilities/blueborne</a> <a href="https://access.redhat.com/solutions/3177231">https://access.redhat.com/solutions/3177231</a> <a href="https://access.redhat.com/blogs/product-security/posts/blueborne">https://access.redhat.com/blogs/product-security/posts/blueborne</a> An upstream patch: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e860d2c904d1a9f38a24eb44c9f34b8f915a6ea3">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e860d2c904d1a9f38a24eb44c9f34b8f915a6ea3</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | <=4.12.12-2<=3.12.9-1 | 3.16.43-2+deb8u4 4.9.30-2+deb9u4 4.12.13-1 |
Linux Linux kernel | >=2.6.32<3.2.94 | |
Linux Linux kernel | >=3.3<3.16.49 | |
Linux Linux kernel | >=3.17<3.18.71 | |
Linux Linux kernel | >=3.19<4.1.45 | |
Linux Linux kernel | >=4.2<4.4.88 | |
Linux Linux kernel | >=4.5<4.9.50 | |
Linux Linux kernel | >=4.10<4.12.13 | |
Linux Linux kernel | >=4.13<4.13.2 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
All of | ||
Any of | ||
Nvidia Jetson Tk1 | =r21 | |
Nvidia Jetson Tk1 | =r24 | |
NVIDIA Jetson TX1 | =r21 | |
NVIDIA Jetson TX1 | =r24 | |
Linux Linux kernel | ||
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =6.2 | |
Redhat Enterprise Linux Server Aus | =6.4 | |
Redhat Enterprise Linux Server Aus | =6.6 | |
Redhat Enterprise Linux Server Aus | =7.2 | |
Redhat Enterprise Linux Server Aus | =7.3 | |
Redhat Enterprise Linux Server Aus | =7.4 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Aus | =7.7 | |
Redhat Enterprise Linux Server Eus | =6.7 | |
Redhat Enterprise Linux Server Eus | =7.2 | |
Redhat Enterprise Linux Server Eus | =7.3 | |
Redhat Enterprise Linux Server Eus | =7.4 | |
Redhat Enterprise Linux Server Eus | =7.5 | |
Redhat Enterprise Linux Server Eus | =7.6 | |
Redhat Enterprise Linux Server Eus | =7.7 | |
Redhat Enterprise Linux Server Tus | =6.5 | |
Redhat Enterprise Linux Server Tus | =6.6 | |
Redhat Enterprise Linux Server Tus | =7.2 | |
Redhat Enterprise Linux Server Tus | =7.3 | |
Redhat Enterprise Linux Server Tus | =7.4 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Server Tus | =7.7 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Nvidia Jetson Tk1 | =r21 | |
Nvidia Jetson Tk1 | =r24 | |
NVIDIA Jetson TX1 | =r21 | |
NVIDIA Jetson TX1 | =r24 | |
Linux Linux kernel | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.106-3 6.1.112-1 6.11.4-1 6.11.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.