vulnerability

Ubuntu: (Multiple Advisories) (CVE-2017-1000251): Linux kernel vulnerabilities

Severity
8
CVSS
(AV:A/AC:L/Au:S/C:C/I:C/A:C)
Published
Sep 12, 2017
Added
Sep 19, 2017
Modified
Apr 25, 2025

Description

It was discovered that a buffer overflow existed in the Bluetooth stack of
the Linux kernel when handling L2CAP configuration responses. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2017-1000251)

It was discovered that a buffer overflow existed in the Broadcom FullMAC
WLAN driver in the Linux kernel. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2017-7541)

Solution(s)

ubuntu-upgrade-linux-image-3-13-0-132-genericubuntu-upgrade-linux-image-3-13-0-132-generic-lpaeubuntu-upgrade-linux-image-3-13-0-132-lowlatencyubuntu-upgrade-linux-image-3-13-0-132-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-132-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-132-powerpc-smpubuntu-upgrade-linux-image-3-13-0-132-powerpc64-embubuntu-upgrade-linux-image-3-13-0-132-powerpc64-smpubuntu-upgrade-linux-image-3-2-0-131-genericubuntu-upgrade-linux-image-3-2-0-131-generic-paeubuntu-upgrade-linux-image-3-2-0-131-highbankubuntu-upgrade-linux-image-3-2-0-131-omapubuntu-upgrade-linux-image-3-2-0-131-powerpc-smpubuntu-upgrade-linux-image-3-2-0-131-powerpc64-smpubuntu-upgrade-linux-image-3-2-0-131-virtualubuntu-upgrade-linux-image-4-10-0-1018-raspi2ubuntu-upgrade-linux-image-4-10-0-35-genericubuntu-upgrade-linux-image-4-10-0-35-generic-lpaeubuntu-upgrade-linux-image-4-10-0-35-lowlatencyubuntu-upgrade-linux-image-4-4-0-1007-kvmubuntu-upgrade-linux-image-4-4-0-1031-gkeubuntu-upgrade-linux-image-4-4-0-1035-awsubuntu-upgrade-linux-image-4-4-0-1074-raspi2ubuntu-upgrade-linux-image-4-4-0-1076-snapdragonubuntu-upgrade-linux-image-4-4-0-96-genericubuntu-upgrade-linux-image-4-4-0-96-generic-lpaeubuntu-upgrade-linux-image-4-4-0-96-lowlatencyubuntu-upgrade-linux-image-4-4-0-96-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-96-powerpc-smpubuntu-upgrade-linux-image-4-4-0-96-powerpc64-embubuntu-upgrade-linux-image-4-4-0-96-powerpc64-smpubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-lts-trustyubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-trustyubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-generic-paeubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-highbankubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-omapubuntu-upgrade-linux-image-powerpc-e500ubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-virtual
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.