vulnerability

Ubuntu: (Multiple Advisories) (CVE-2017-1000251): Linux kernel vulnerabilities

Severity
8
CVSS
(AV:A/AC:L/Au:S/C:C/I:C/A:C)
Published
Sep 12, 2017
Added
Sep 19, 2017
Modified
Mar 27, 2026

Description

The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.

Solutions

ubuntu-upgrade-linux-image-3-13-0-132-genericubuntu-upgrade-linux-image-3-13-0-132-generic-lpaeubuntu-upgrade-linux-image-3-13-0-132-lowlatencyubuntu-upgrade-linux-image-3-13-0-132-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-132-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-132-powerpc-smpubuntu-upgrade-linux-image-3-13-0-132-powerpc64-embubuntu-upgrade-linux-image-3-13-0-132-powerpc64-smpubuntu-upgrade-linux-image-3-2-0-131-genericubuntu-upgrade-linux-image-3-2-0-131-generic-paeubuntu-upgrade-linux-image-3-2-0-131-highbankubuntu-upgrade-linux-image-3-2-0-131-omapubuntu-upgrade-linux-image-3-2-0-131-powerpc-smpubuntu-upgrade-linux-image-3-2-0-131-powerpc64-smpubuntu-upgrade-linux-image-3-2-0-131-virtualubuntu-upgrade-linux-image-4-10-0-1018-raspi2ubuntu-upgrade-linux-image-4-10-0-35-genericubuntu-upgrade-linux-image-4-10-0-35-generic-lpaeubuntu-upgrade-linux-image-4-10-0-35-lowlatencyubuntu-upgrade-linux-image-4-4-0-1007-kvmubuntu-upgrade-linux-image-4-4-0-1031-gkeubuntu-upgrade-linux-image-4-4-0-1035-awsubuntu-upgrade-linux-image-4-4-0-1074-raspi2ubuntu-upgrade-linux-image-4-4-0-1076-snapdragonubuntu-upgrade-linux-image-4-4-0-96-genericubuntu-upgrade-linux-image-4-4-0-96-generic-lpaeubuntu-upgrade-linux-image-4-4-0-96-lowlatencyubuntu-upgrade-linux-image-4-4-0-96-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-96-powerpc-smpubuntu-upgrade-linux-image-4-4-0-96-powerpc64-embubuntu-upgrade-linux-image-4-4-0-96-powerpc64-smpubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-lts-trustyubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-trustyubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-generic-paeubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-highbankubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-omapubuntu-upgrade-linux-image-powerpc-e500ubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-virtual

References

    Title
    Rapid7 Labs

    2026 Global Threat Landscape Report

    The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.