vulnerability
Ubuntu: (Multiple Advisories) (CVE-2017-1000251): Linux kernel vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:A/AC:L/Au:S/C:C/I:C/A:C) | Sep 12, 2017 | Sep 19, 2017 | Mar 27, 2026 |
Severity
8
CVSS
(AV:A/AC:L/Au:S/C:C/I:C/A:C)
Published
Sep 12, 2017
Added
Sep 19, 2017
Modified
Mar 27, 2026
Description
The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.
Solutions
ubuntu-upgrade-linux-image-3-13-0-132-genericubuntu-upgrade-linux-image-3-13-0-132-generic-lpaeubuntu-upgrade-linux-image-3-13-0-132-lowlatencyubuntu-upgrade-linux-image-3-13-0-132-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-132-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-132-powerpc-smpubuntu-upgrade-linux-image-3-13-0-132-powerpc64-embubuntu-upgrade-linux-image-3-13-0-132-powerpc64-smpubuntu-upgrade-linux-image-3-2-0-131-genericubuntu-upgrade-linux-image-3-2-0-131-generic-paeubuntu-upgrade-linux-image-3-2-0-131-highbankubuntu-upgrade-linux-image-3-2-0-131-omapubuntu-upgrade-linux-image-3-2-0-131-powerpc-smpubuntu-upgrade-linux-image-3-2-0-131-powerpc64-smpubuntu-upgrade-linux-image-3-2-0-131-virtualubuntu-upgrade-linux-image-4-10-0-1018-raspi2ubuntu-upgrade-linux-image-4-10-0-35-genericubuntu-upgrade-linux-image-4-10-0-35-generic-lpaeubuntu-upgrade-linux-image-4-10-0-35-lowlatencyubuntu-upgrade-linux-image-4-4-0-1007-kvmubuntu-upgrade-linux-image-4-4-0-1031-gkeubuntu-upgrade-linux-image-4-4-0-1035-awsubuntu-upgrade-linux-image-4-4-0-1074-raspi2ubuntu-upgrade-linux-image-4-4-0-1076-snapdragonubuntu-upgrade-linux-image-4-4-0-96-genericubuntu-upgrade-linux-image-4-4-0-96-generic-lpaeubuntu-upgrade-linux-image-4-4-0-96-lowlatencyubuntu-upgrade-linux-image-4-4-0-96-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-96-powerpc-smpubuntu-upgrade-linux-image-4-4-0-96-powerpc64-embubuntu-upgrade-linux-image-4-4-0-96-powerpc64-smpubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-lts-trustyubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-trustyubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-generic-paeubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-highbankubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-omapubuntu-upgrade-linux-image-powerpc-e500ubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-virtual
References
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.