First published: Mon Jul 29 2019(Updated: )
A flaw was found in the Linux kernel's Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1127.rt56.1093.el7 | 0:3.10.0-1127.rt56.1093.el7 |
redhat/kernel | <0:3.10.0-1127.el7 | 0:3.10.0-1127.el7 |
redhat/kernel-rt | <0:4.18.0-147.rt24.93.el8 | 0:4.18.0-147.rt24.93.el8 |
redhat/kernel | <0:4.18.0-147.el8 | 0:4.18.0-147.el8 |
IBM Data Risk Manager | <=2.0.6 | |
Linux Kernel | >=3.0<4.18.0 | |
Linux Kernel | >=5.0<=5.4 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.133-1 6.12.22-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-10207 is classified as a high severity vulnerability in the Linux kernel's Bluetooth implementation.
To fix CVE-2019-10207, upgrade to kernel versions 4.18.0 or later, or to specific patched versions provided by your Linux distribution.
An attacker needs local access and write permissions to the Bluetooth hardware to exploit CVE-2019-10207.
CVE-2019-10207 affects all Linux kernel versions from 3.x.x before 4.18.0 and 5.x.x up to 5.4.
While CVE-2019-10207 affects the general Linux kernel, specific distributions like Red Hat and Debian have their own patched releases available.