CVE-2017-1000251: bluetooth l2cap remote code execution vulnerability (blueborne).

  • 7021383
  • 13-Sep-2017
  • 22-Sep-2017

Environment

SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Server 12 Service Pack 1 (SLES 12 SP1)
SUSE Linux Enterprise Server 12 Service Pack 2 (SLES 12 SP2)
SUSE Linux Enterprise Server 12 Service Pack 3 (SLES 12 SP3)

Situation

The native Bluetooth stack (BlueZ) in the Linux Kernel, starting with Linux kernel version 3.3-rc1 and later, is vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in remote code execution in kernel space.

Resolution

SUSE released the following kernel versions to resolve this issue:

SLES 12 GA LTSS:     3.12.61-52.92.1
SLES 12 SP1 LTSS:    3.12.74-60.64.60.1
SLES 12 SP2:     4.4.74-92.38.1
SLES 12 SP3:     4.4.82-6.6.1

Affected systems should be updated as soon as possible, a workaround can be to temporarily disable bluetooth support.

Note however that SUSE Linux Enterprise kernels are built with Stackprotector support which
will catch these kinds of stack overflows and cause a controlled abort.

Cause

Critical security vulnerability in the Bluetooth stack of the Linux kernel (BlueZ).

Additional Information

Also see CVE-2017-1000251 for more information.

Feedback service temporarily unavailable. For content questions or problems, please contact Support.