vulnerability
Ubuntu: (Multiple Advisories) (CVE-2017-12134): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | Aug 23, 2017 | Oct 11, 2017 | Apr 25, 2025 |
Description
Jan H. Schönherr discovered that the Xen subsystem did not properly handle
block IO merges correctly in some situations. An attacker in a guest vm
could use this to cause a denial of service (host crash) or possibly gain
administrative privileges in the host. (CVE-2017-12134)
Andrey Konovalov discovered that a divide-by-zero error existed in the TCP
stack implementation in the Linux kernel. A local attacker could use this
to cause a denial of service (system crash). (CVE-2017-14106)
Otto Ebeling discovered that the memory manager in the Linux kernel did not
properly check the effective UID in some situations. A local attacker could
use this to expose sensitive information. (CVE-2017-14140)
Solution(s)
References
- CVE-2017-12134
- https://attackerkb.com/topics/CVE-2017-12134
- DEBIAN-DSA-3981
- NVD-CVE-2017-12134
- UBUNTU-USN-3444-1
- UBUNTU-USN-3444-2
- UBUNTU-USN-3617-1
- UBUNTU-USN-3617-2
- UBUNTU-USN-3617-3
- UBUNTU-USN-3619-1
- UBUNTU-USN-3619-2
- UBUNTU-USN-3631-1
- UBUNTU-USN-3631-2
- UBUNTU-USN-3651-1
- UBUNTU-USN-3652-1
- UBUNTU-USN-3653-1
- UBUNTU-USN-3653-2
- UBUNTU-USN-3654-1
- UBUNTU-USN-3654-2
- UBUNTU-USN-3655-1
- UBUNTU-USN-3655-2
- UBUNTU-USN-3656-1
- UBUNTU-USN-3657-1
- UBUNTU-USN-3679-1
- UBUNTU-USN-3680-1
- UBUNTU-USN-3756-1
- UBUNTU-USN-3777-3

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.