Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-1000251

Опубликовано: 12 сент. 2017
Источник: debian
EPSS Низкий

Описание

The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.12.13-1package

Примечания

  • Fixed by: https://git.kernel.org/linus/e860d2c904d1a9f38a24eb44c9f34b8f915a6ea3

  • https://www.armis.com/blueborne/

  • https://access.redhat.com/security/vulnerabilities/blueborne

EPSS

Процентиль: 87%
0.03466
Низкий

Связанные уязвимости

CVSS3: 8
ubuntu
около 8 лет назад

The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.

CVSS3: 7.5
redhat
около 8 лет назад

The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.

CVSS3: 8
nvd
около 8 лет назад

The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.

suse-cvrf
около 8 лет назад

Security update for Linux Kernel Live Patch 1 for SLE 12 SP3

suse-cvrf
около 8 лет назад

Security update for the Linux Kernel

EPSS

Процентиль: 87%
0.03466
Низкий