vulnerability
Ubuntu: (Multiple Advisories) (CVE-2017-10663): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | Aug 19, 2017 | Sep 19, 2017 | Apr 25, 2025 |
Description
It was discovered that a buffer overflow existed in the Bluetooth stack of
the Linux kernel when handling L2CAP configuration responses. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2017-1000251)
It was discovered that the Flash-Friendly File System (f2fs) implementation
in the Linux kernel did not properly validate superblock metadata. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2017-10663)
It was discovered that a buffer overflow existed in the ioctl handling code
in the ISDN subsystem of the Linux kernel. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2017-12762)
Pengfei Wang discovered that a race condition existed in the NXP SAA7164 TV
Decoder driver for the Linux kernel. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2017-8831)
Solution(s)
References
- CVE-2017-10663
- https://attackerkb.com/topics/CVE-2017-10663
- NVD-CVE-2017-10663
- UBUNTU-USN-3190-1
- UBUNTU-USN-3190-2
- UBUNTU-USN-3312-1
- UBUNTU-USN-3312-2
- UBUNTU-USN-3405-1
- UBUNTU-USN-3405-2
- UBUNTU-USN-3414-1
- UBUNTU-USN-3420-1
- UBUNTU-USN-3420-2
- UBUNTU-USN-3468-1
- UBUNTU-USN-3468-2
- UBUNTU-USN-3468-3
- UBUNTU-USN-3469-1
- UBUNTU-USN-3469-2
- UBUNTU-USN-3470-1
- UBUNTU-USN-3470-2

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.