vulnerability
Ubuntu: (Multiple Advisories) (CVE-2017-7895): Linux kernel vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | Apr 28, 2017 | Jun 8, 2017 | Mar 27, 2026 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Apr 28, 2017
Added
Jun 8, 2017
Modified
Mar 27, 2026
Description
The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certain checks for the end of a buffer, which allows remote attackers to trigger pointer-arithmetic errors or possibly have unspecified other impact via crafted requests, related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.
Solutions
ubuntu-upgrade-linux-image-3-13-0-125-genericubuntu-upgrade-linux-image-3-13-0-125-generic-lpaeubuntu-upgrade-linux-image-3-13-0-125-lowlatencyubuntu-upgrade-linux-image-3-13-0-125-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-125-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-125-powerpc-smpubuntu-upgrade-linux-image-3-13-0-125-powerpc64-embubuntu-upgrade-linux-image-3-13-0-125-powerpc64-smpubuntu-upgrade-linux-image-4-10-0-1006-raspi2ubuntu-upgrade-linux-image-4-10-0-22-genericubuntu-upgrade-linux-image-4-10-0-22-generic-lpaeubuntu-upgrade-linux-image-4-10-0-22-lowlatencyubuntu-upgrade-linux-image-4-10-0-27-genericubuntu-upgrade-linux-image-4-10-0-27-generic-lpaeubuntu-upgrade-linux-image-4-10-0-27-lowlatencyubuntu-upgrade-linux-image-4-4-0-1014-gkeubuntu-upgrade-linux-image-4-4-0-1018-awsubuntu-upgrade-linux-image-4-4-0-1057-raspi2ubuntu-upgrade-linux-image-4-4-0-1059-snapdragonubuntu-upgrade-linux-image-4-4-0-79-genericubuntu-upgrade-linux-image-4-4-0-79-generic-lpaeubuntu-upgrade-linux-image-4-4-0-79-lowlatencyubuntu-upgrade-linux-image-4-4-0-79-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-79-powerpc-smpubuntu-upgrade-linux-image-4-4-0-79-powerpc64-embubuntu-upgrade-linux-image-4-4-0-79-powerpc64-smpubuntu-upgrade-linux-image-4-8-0-1043-raspi2ubuntu-upgrade-linux-image-4-8-0-59-genericubuntu-upgrade-linux-image-4-8-0-59-generic-lpaeubuntu-upgrade-linux-image-4-8-0-59-lowlatencyubuntu-upgrade-linux-image-4-8-0-59-powerpc-e500mcubuntu-upgrade-linux-image-4-8-0-59-powerpc-smpubuntu-upgrade-linux-image-4-8-0-59-powerpc64-embubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-lts-trustyubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-trustyubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-powerpc-e500ubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-virtual
References
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.