vulnerability

Ubuntu: (Multiple Advisories) (CVE-2017-2596): Linux kernel vulnerabilities

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:C)
Published
Feb 6, 2017
Added
May 18, 2017
Modified
Apr 25, 2025

Description

Dmitry Vyukov discovered that KVM implementation in the Linux kernel
improperly emulated the VMXON instruction. A local attacker in a guest OS
could use this to cause a denial of service (memory consumption) in the
host OS. (CVE-2017-2596)

Dmitry Vyukov discovered that the generic SCSI (sg) subsystem in the Linux
kernel contained a stack-based buffer overflow. A local attacker with
access to an sg device could use this to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2017-7187)

It was discovered that a NULL pointer dereference existed in the Direct
Rendering Manager (DRM) driver for VMWare devices in the Linux kernel. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2017-7261)

Li Qiang discovered that an integer overflow vulnerability existed in the
Direct Rendering Manager (DRM) driver for VMWare devices in the Linux
kernel. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2017-7294)

Jason Donenfeld discovered a heap overflow in the MACsec module in the
Linux kernel. An attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2017-7477)

It was discovered that an information leak existed in the set_mempolicy and
mbind compat syscalls in the Linux kernel. A local attacker could use this
to expose sensitive information (kernel memory). (CVE-2017-7616)

Solution(s)

ubuntu-upgrade-linux-image-4-10-0-1005-raspi2ubuntu-upgrade-linux-image-4-10-0-21-genericubuntu-upgrade-linux-image-4-10-0-21-generic-lpaeubuntu-upgrade-linux-image-4-10-0-21-lowlatencyubuntu-upgrade-linux-image-4-10-0-27-genericubuntu-upgrade-linux-image-4-10-0-27-generic-lpaeubuntu-upgrade-linux-image-4-10-0-27-lowlatencyubuntu-upgrade-linux-image-4-4-0-1014-gkeubuntu-upgrade-linux-image-4-4-0-1018-awsubuntu-upgrade-linux-image-4-4-0-1057-raspi2ubuntu-upgrade-linux-image-4-4-0-1059-snapdragonubuntu-upgrade-linux-image-4-4-0-79-genericubuntu-upgrade-linux-image-4-4-0-79-generic-lpaeubuntu-upgrade-linux-image-4-4-0-79-lowlatencyubuntu-upgrade-linux-image-4-4-0-79-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-79-powerpc-smpubuntu-upgrade-linux-image-4-4-0-79-powerpc64-embubuntu-upgrade-linux-image-4-4-0-79-powerpc64-smpubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-virtual
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.