7021383: CVE-2017-1000251: bluetooth l2cap remote code execution vulnerability (blueborne).

This document (7021383) is provided subject to the disclaimer at the end of this document.

Environment

SUSE Linux Enterprise Server 12

SUSE Linux Enterprise Server 12 Service Pack 1 (SLES 12 SP1)

SUSE Linux Enterprise Server 12 Service Pack 2 (SLES 12 SP2)

SUSE Linux Enterprise Server 12 Service Pack 3 (SLES 12 SP3)

Situation

The native Bluetooth stack (BlueZ) in the Linux Kernel, starting with Linux kernel version 3.3-rc1 and later, is vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in remote code execution in kernel space.

Resolution

SUSE released the following kernel versions to resolve this issue:

SLES 12 GA LTSS: 3.12.61-52.92.1

SLES 12 SP1 LTSS: 3.12.74-60.64.60.1

SLES 12 SP2: 4.4.74-92.38.1

SLES 12 SP3: 4.4.82-6.6.1

Affected systems should be updated as soon as possible, a workaround can be to temporarily disable bluetooth support.

Note however that SUSE Linux Enterprise kernels are built with Stackprotector support which

will catch these kinds of stack overflows and cause a controlled abort.

Cause

Critical security vulnerability in the Bluetooth stack of the Linux kernel (BlueZ).

Additional Information

Also see CVE-2017-1000251 for more information.

Disclaimer

This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented “AS IS” WITHOUT WARRANTY OF ANY KIND.

Related:

Leave a Reply