Linux Impacted By Information Leak & Remote Code Execution Via Bluetooth
Written by Michael Larabel in Standards on 12 September 2017 at 03:38 PM EDT. 26 Comments
Armis Labs has gone public today with "Bluebourne", an IoT-focused attack vector via Bluetooth. This Bluetooth attack does not require the targeted device to even be paired with the attacker or on discoverable mode, making it more frightening.

Bluebourne is a set of attack vectors discovered by the security researchers and affects Windows, all Android phones, iOS, and the Linux desktop, making this quite far reaching.

In terms of the Linux exposure to Bluebourne, all Linux devices running BlueZ are prone to an information leak vulnerability. Additionally, all systems running a post-3.3 Linux kernel are affected by a remote code execution vulnerability.

CVE-2017-1000250 basically comes down to a stack overflow within the kernel, similar to CVE-2017-1000251. "A client could send arbitrary L2CAP configuration parameters which were stored in a stack buffer object. These parameters could exceed the buffer length, overwriting the adjacent kernel stack contents. This exchange occurs, prior to any authentication, when establishing a Bluetooth connection."

More details via the Bluebourne page.
Related News
About The Author
Author picture

Michael Larabel is the principal author of and founded the site in 2004 with a focus on enriching the Linux hardware experience. Michael has written more than 20,000 articles covering the state of Linux hardware support, Linux performance, graphics drivers, and other topics. Michael is also the lead developer of the Phoronix Test Suite, Phoromatic, and automated benchmarking software. He can be followed via Twitter or contacted via

Popular News This Week