vulnerability
Ubuntu: (Multiple Advisories) (CVE-2017-7895): Linux kernel vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | Apr 28, 2017 | Jun 8, 2017 | Mar 27, 2026 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Apr 28, 2017
Added
Jun 8, 2017
Modified
Mar 27, 2026
Description
The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certain checks for the end of a buffer, which allows remote attackers to trigger pointer-arithmetic errors or possibly have unspecified other impact via crafted requests, related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.
Solutions
ubuntu-upgrade-linux-image-3-13-0-125-genericubuntu-upgrade-linux-image-3-13-0-125-generic-lpaeubuntu-upgrade-linux-image-3-13-0-125-lowlatencyubuntu-upgrade-linux-image-3-13-0-125-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-125-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-125-powerpc-smpubuntu-upgrade-linux-image-3-13-0-125-powerpc64-embubuntu-upgrade-linux-image-3-13-0-125-powerpc64-smpubuntu-upgrade-linux-image-4-10-0-1006-raspi2ubuntu-upgrade-linux-image-4-10-0-22-genericubuntu-upgrade-linux-image-4-10-0-22-generic-lpaeubuntu-upgrade-linux-image-4-10-0-22-lowlatencyubuntu-upgrade-linux-image-4-10-0-27-genericubuntu-upgrade-linux-image-4-10-0-27-generic-lpaeubuntu-upgrade-linux-image-4-10-0-27-lowlatencyubuntu-upgrade-linux-image-4-4-0-1014-gkeubuntu-upgrade-linux-image-4-4-0-1018-awsubuntu-upgrade-linux-image-4-4-0-1057-raspi2ubuntu-upgrade-linux-image-4-4-0-1059-snapdragonubuntu-upgrade-linux-image-4-4-0-79-genericubuntu-upgrade-linux-image-4-4-0-79-generic-lpaeubuntu-upgrade-linux-image-4-4-0-79-lowlatencyubuntu-upgrade-linux-image-4-4-0-79-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-79-powerpc-smpubuntu-upgrade-linux-image-4-4-0-79-powerpc64-embubuntu-upgrade-linux-image-4-4-0-79-powerpc64-smpubuntu-upgrade-linux-image-4-8-0-1043-raspi2ubuntu-upgrade-linux-image-4-8-0-59-genericubuntu-upgrade-linux-image-4-8-0-59-generic-lpaeubuntu-upgrade-linux-image-4-8-0-59-lowlatencyubuntu-upgrade-linux-image-4-8-0-59-powerpc-e500mcubuntu-upgrade-linux-image-4-8-0-59-powerpc-smpubuntu-upgrade-linux-image-4-8-0-59-powerpc64-embubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-lts-trustyubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-trustyubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-powerpc-e500ubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-virtual
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.