vulnerability
Ubuntu: (Multiple Advisories) (CVE-2017-7187): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | Mar 20, 2017 | May 18, 2017 | Apr 25, 2025 |
Description
Dmitry Vyukov discovered that the generic SCSI (sg) subsystem in the Linux
kernel contained a stack-based buffer overflow. A local attacker with
access to an sg device could use this to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2017-7187)
It was discovered that a NULL pointer dereference existed in the Direct
Rendering Manager (DRM) driver for VMWare devices in the Linux kernel. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2017-7261)
Li Qiang discovered that an integer overflow vulnerability existed in the
Direct Rendering Manager (DRM) driver for VMWare devices in the Linux
kernel. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2017-7294)
It was discovered that an information leak existed in the set_mempolicy and
mbind compat syscalls in the Linux kernel. A local attacker could use this
to expose sensitive information (kernel memory). (CVE-2017-7616)
Solution(s)
References
- CVE-2017-7187
- https://attackerkb.com/topics/CVE-2017-7187
- NVD-CVE-2017-7187
- UBUNTU-USN-3146-1
- UBUNTU-USN-3146-2
- UBUNTU-USN-3147-1
- UBUNTU-USN-3161-3
- UBUNTU-USN-3161-4
- UBUNTU-USN-3162-2
- UBUNTU-USN-3208-1
- UBUNTU-USN-3208-2
- UBUNTU-USN-3265-1
- UBUNTU-USN-3265-2
- UBUNTU-USN-3291-1
- UBUNTU-USN-3291-2
- UBUNTU-USN-3291-3
- UBUNTU-USN-3293-1
- UBUNTU-USN-3312-1
- UBUNTU-USN-3312-2
- UBUNTU-USN-3314-1
- UBUNTU-USN-3361-1
- UBUNTU-USN-3405-1
- UBUNTU-USN-3405-2
- UBUNTU-USN-3419-1
- UBUNTU-USN-3419-2
- UBUNTU-USN-3420-1
- UBUNTU-USN-3420-2
- UBUNTU-USN-3422-1
- UBUNTU-USN-3422-2
- UBUNTU-USN-3423-1

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.