7021383: CVE-2017-1000251: bluetooth l2cap remote code execution vulnerability (blueborne)

This document (7021383) is provided subject to the disclaimer at the end of this document.

Environment

SUSE Linux Enterprise Server 12

SUSE Linux Enterprise Server 12 Service Pack 1 (SLES 12 SP1)

SUSE Linux Enterprise Server 12 Service Pack 2 (SLES 12 SP2)

SUSE Linux Enterprise Server 12 Service Pack 3 (SLES 12 SP3)

Situation

The native Bluetooth stack (BlueZ) in the Linux Kernel, starting with Linux kernel version 3.3-rc1 and later, is vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in remote code execution in kernel space.

Resolution

SUSE is working on releasing patches for the affected versions, once the patches are released affected systems should be updated as soon as possible. In the interim a workaround would be to temporarily disable bluetooth support until SUSE has released fixed kernel packages.

Note however that SUSE Linux Enterprise kernels are built with Stackprotector support which

will catch these kinds of stack overflows and cause a controlled abort.

Cause

Critical security vulnerability in the Bluetooth stack of the Linux kernel (BlueZ).

Additional Information

Also see CVE-2017-1000251 for more information.

Disclaimer

This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented “AS IS” WITHOUT WARRANTY OF ANY KIND.

Related:

Leave a Reply