{"id":"USN-3291-2","summary":"linux-aws, linux-gke, linux-raspi2, linux-snapdragon vulnerabilities","details":"USN-3291-1 fixed vulnerabilities in the generic Linux kernel.\nThis update provides the corresponding updates for the Linux kernel\nbuilt for specific processors and cloud environments.\n\nDmitry Vyukov discovered that the generic SCSI (sg) subsystem in the Linux\nkernel contained a stack-based buffer overflow. A local attacker with\naccess to an sg device could use this to cause a denial of service (system\ncrash) or possibly execute arbitrary code. (CVE-2017-7187)\n\nIt was discovered that a NULL pointer dereference existed in the Direct\nRendering Manager (DRM) driver for VMWare devices in the Linux kernel. A\nlocal attacker could use this to cause a denial of service (system crash).\n(CVE-2017-7261)\n\nLi Qiang discovered that an integer overflow vulnerability existed in the\nDirect Rendering Manager (DRM) driver for VMWare devices in the Linux\nkernel. A local attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2017-7294)\n\nIt was discovered that an information leak existed in the set_mempolicy and\nmbind compat syscalls in the Linux kernel. A local attacker could use this\nto expose sensitive information (kernel memory). (CVE-2017-7616)\n","modified":"2026-02-10T04:41:07Z","published":"2017-05-17T18:23:37Z","related":["UBUNTU-CVE-2017-7187","UBUNTU-CVE-2017-7261","UBUNTU-CVE-2017-7294","UBUNTU-CVE-2017-7616"],"upstream":["CVE-2017-7187","CVE-2017-7261","CVE-2017-7294","CVE-2017-7616","UBUNTU-CVE-2017-7187","UBUNTU-CVE-2017-7261","UBUNTU-CVE-2017-7294","UBUNTU-CVE-2017-7616"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3291-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-7187"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-7261"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-7294"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-7616"}],"affected":[{"package":{"name":"linux-aws","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/linux-aws@4.4.0-1017.26?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-1017.26"}]}],"versions":["4.4.0-1001.10","4.4.0-1003.12","4.4.0-1004.13","4.4.0-1007.16","4.4.0-1009.18","4.4.0-1011.20","4.4.0-1012.21","4.4.0-1013.22","4.4.0-1016.25"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.4.0-1017.26","binary_name":"linux-aws-cloud-tools-4.4.0-1017"},{"binary_version":"4.4.0-1017.26","binary_name":"linux-aws-cloud-tools-common"},{"binary_version":"4.4.0-1017.26","binary_name":"linux-aws-headers-4.4.0-1017"},{"binary_version":"4.4.0-1017.26","binary_name":"linux-aws-source-4.4.0"},{"binary_version":"4.4.0-1017.26","binary_name":"linux-aws-tools-4.4.0-1017"},{"binary_version":"4.4.0-1017.26","binary_name":"linux-aws-tools-common"},{"binary_version":"4.4.0-1017.26","binary_name":"linux-cloud-tools-4.4.0-1017-aws"},{"binary_version":"4.4.0-1017.26","binary_name":"linux-headers-4.4.0-1017-aws"},{"binary_version":"4.4.0-1017.26","binary_name":"linux-image-4.4.0-1017-aws"},{"binary_version":"4.4.0-1017.26","binary_name":"linux-tools-4.4.0-1017-aws"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-7187"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-7261"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-7294"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-7616"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3291-2.json"}},{"package":{"name":"linux-gke","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/linux-gke@4.4.0-1013.13?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-1013.13"}]}],"versions":["4.4.0-1003.3","4.4.0-1005.6","4.4.0-1006.6","4.4.0-1008.8","4.4.0-1009.9","4.4.0-1010.10","4.4.0-1012.12"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.4.0-1013.13","binary_name":"linux-cloud-tools-4.4.0-1013-gke"},{"binary_version":"4.4.0-1013.13","binary_name":"linux-gke-cloud-tools-4.4.0-1013"},{"binary_version":"4.4.0-1013.13","binary_name":"linux-gke-cloud-tools-common"},{"binary_version":"4.4.0-1013.13","binary_name":"linux-gke-headers-4.4.0-1013"},{"binary_version":"4.4.0-1013.13","binary_name":"linux-gke-source-4.4.0"},{"binary_version":"4.4.0-1013.13","binary_name":"linux-gke-tools-4.4.0-1013"},{"binary_version":"4.4.0-1013.13","binary_name":"linux-gke-tools-common"},{"binary_version":"4.4.0-1013.13","binary_name":"linux-headers-4.4.0-1013-gke"},{"binary_version":"4.4.0-1013.13","binary_name":"linux-image-4.4.0-1013-gke"},{"binary_version":"4.4.0-1013.13","binary_name":"linux-image-extra-4.4.0-1013-gke"},{"binary_version":"4.4.0-1013.13","binary_name":"linux-tools-4.4.0-1013-gke"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-7187"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-7261"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-7294"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-7616"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3291-2.json"}},{"package":{"name":"linux-raspi2","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/linux-raspi2@4.4.0-1055.62?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-1055.62"}]}],"versions":["4.2.0-1013.19","4.2.0-1014.21","4.3.0-1006.6","4.4.0-1003.4","4.4.0-1004.5","4.4.0-1009.10","4.4.0-1010.12","4.4.0-1010.13","4.4.0-1012.16","4.4.0-1016.22","4.4.0-1017.23","4.4.0-1019.25","4.4.0-1021.27","4.4.0-1023.29","4.4.0-1027.33","4.4.0-1029.36","4.4.0-1034.41","4.4.0-1038.45","4.4.0-1040.47","4.4.0-1042.49","4.4.0-1044.51","4.4.0-1046.53","4.4.0-1048.55","4.4.0-1050.57","4.4.0-1051.58","4.4.0-1052.59","4.4.0-1054.61"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.4.0-1055.62","binary_name":"linux-headers-4.4.0-1055-raspi2"},{"binary_version":"4.4.0-1055.62","binary_name":"linux-image-4.4.0-1055-raspi2"},{"binary_version":"4.4.0-1055.62","binary_name":"linux-raspi2-headers-4.4.0-1055"},{"binary_version":"4.4.0-1055.62","binary_name":"linux-raspi2-tools-4.4.0-1055"},{"binary_version":"4.4.0-1055.62","binary_name":"linux-tools-4.4.0-1055-raspi2"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-7187"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-7261"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-7294"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-7616"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3291-2.json"}},{"package":{"name":"linux-snapdragon","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/linux-snapdragon@4.4.0-1058.62?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-1058.62"}]}],"versions":["4.4.0-1012.12","4.4.0-1013.14","4.4.0-1013.15","4.4.0-1015.18","4.4.0-1019.22","4.4.0-1020.23","4.4.0-1022.25","4.4.0-1024.27","4.4.0-1026.29","4.4.0-1030.33","4.4.0-1032.36","4.4.0-1035.39","4.4.0-1039.43","4.4.0-1042.46","4.4.0-1044.48","4.4.0-1046.50","4.4.0-1047.51","4.4.0-1048.52","4.4.0-1050.54","4.4.0-1051.55","4.4.0-1053.57","4.4.0-1054.58","4.4.0-1055.59","4.4.0-1057.61"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.4.0-1058.62","binary_name":"linux-headers-4.4.0-1058-snapdragon"},{"binary_version":"4.4.0-1058.62","binary_name":"linux-image-4.4.0-1058-snapdragon"},{"binary_version":"4.4.0-1058.62","binary_name":"linux-snapdragon-headers-4.4.0-1058"},{"binary_version":"4.4.0-1058.62","binary_name":"linux-snapdragon-tools-4.4.0-1058"},{"binary_version":"4.4.0-1058.62","binary_name":"linux-tools-4.4.0-1058-snapdragon"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-7187"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-7261"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-7294"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-7616"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3291-2.json"}}],"schema_version":"1.7.3"}