First published: Mon Sep 18 2017(Updated: )
It was discovered that a buffer overflow existed in the Bluetooth stack of the Linux kernel when handling L2CAP configuration responses. A physically proximate attacker could use this to cause a denial of service (system crash).
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-powerpc-smp | <3.2.0.131.145 | 3.2.0.131.145 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-131-omap | <3.2.0-131.177 | 3.2.0-131.177 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-131-powerpc-smp | <3.2.0-131.177 | 3.2.0-131.177 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-generic | <3.2.0.131.145 | 3.2.0.131.145 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-131-generic-pae | <3.2.0-131.177 | 3.2.0-131.177 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-131-highbank | <3.2.0-131.177 | 3.2.0-131.177 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-generic-pae | <3.2.0.131.145 | 3.2.0.131.145 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-131-virtual | <3.2.0-131.177 | 3.2.0-131.177 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-highbank | <3.2.0.131.145 | 3.2.0.131.145 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-virtual | <3.2.0.131.145 | 3.2.0.131.145 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-powerpc64-smp | <3.2.0.131.145 | 3.2.0.131.145 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-131-generic | <3.2.0-131.177 | 3.2.0-131.177 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-omap | <3.2.0.131.145 | 3.2.0.131.145 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-131-powerpc64-smp | <3.2.0-131.177 | 3.2.0-131.177 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Linux kernel vulnerability is USN-3423-1.
The severity of USN-3423-1 is not mentioned in the provided information.
A physically proximate attacker can exploit USN-3423-1 by causing a denial of service through a buffer overflow in the Bluetooth stack.
USN-3423-1 affects Ubuntu 12.04.
To fix USN-3423-1 on Ubuntu 12.04, update to the specified Linux kernel version mentioned in the provided information.