CVE-2017-1000251 Red Hat Update for kernel (RHSA-2017:2682) (Blueborne)

漏洞类别:RedHat

漏洞等级:

漏洞信息

The kernel packages contain the Linux kernel, the core of any Linux operating system.

A stack buffer overflow flaw was found in the way the Bluetooth subsystem of the Linux kernel processed pending L2CAP configuration responses from a client. On systems with the stack protection feature enabled in the kernel (CONFIG_CC_STACKPROTECTOR=y, which is enabled on all architectures other than s390x and ppc64[le]), an unauthenticated attacker able to initiate a connection to a system via Bluetooth could use this flaw to crash the system. Due to the nature of the stack protection feature, code execution cannot be fully ruled out, although we believe it is unlikely. On systems without the stack protection feature (ppc64[le]; the Bluetooth modules are not built on s390x), an unauthenticated attacker able to initiate a connection to a system via Bluetooth could use this flaw to remotely execute arbitrary code on the system with ring 0 (kernel) privileges. (CVE-2017-1000251, Important)
Affected Products:
Red Hat Enterprise Linux Server – Extended Update Support 6.7 x86_64
Red Hat Enterprise Linux Server – Extended Update Support 6.7 i386
Red Hat Enterprise Linux for IBM z Systems – Extended Update Support 6.7 s390x
Red Hat Enterprise Linux for Power, big endian – Extended Update Support 6.7 ppc64
Red Hat Enterprise Linux EUS Compute Node 6.7 x86_64

漏洞危害

An unauthenticated attacker able to initiate a connection to a system via Bluetooth could use this flaw to remotely execute arbitrary code on the system with ring 0 (kernel) privileges.

解决方案

Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

Refer to Red Hat security advisory RHSA-2017:2682 to address this issue and obtain more information.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

RHSA-2017:2682: Red Hat Enterprise Linux

Leave a Reply