{"id":"USN-3468-2","summary":"linux-hwe vulnerabilities","details":"USN-3468-1 fixed vulnerabilities in the Linux kernel for Ubuntu 17.04.\nThis update provides the corresponding updates for the Linux Hardware\nEnablement (HWE) kernel from Ubuntu 17.04 for Ubuntu 16.04 LTS.\n\nIt was discovered that the KVM subsystem in the Linux kernel did not\nproperly bound guest IRQs. A local attacker in a guest VM could use this to\ncause a denial of service (host system crash). (CVE-2017-1000252)\n\nIt was discovered that the Flash-Friendly File System (f2fs) implementation\nin the Linux kernel did not properly validate superblock metadata. A local\nattacker could use this to cause a denial of service (system crash) or\npossibly execute arbitrary code. (CVE-2017-10663)\n\nAnthony Perard discovered that the Xen virtual block driver did not\nproperly initialize some data structures before passing them to user space.\nA local attacker in a guest VM could use this to expose sensitive\ninformation from the host OS or other guest VMs. (CVE-2017-10911)\n\nIt was discovered that a use-after-free vulnerability existed in the POSIX\nmessage queue implementation in the Linux kernel. A local attacker could\nuse this to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2017-11176)\n\nDave Chinner discovered that the XFS filesystem did not enforce that the\nrealtime inode flag was settable only on filesystems on a realtime device.\nA local attacker could use this to cause a denial of service (system\ncrash). (CVE-2017-14340)\n","modified":"2026-02-10T04:41:13Z","published":"2017-10-31T09:13:43Z","related":["UBUNTU-CVE-2017-1000252","UBUNTU-CVE-2017-10663","UBUNTU-CVE-2017-10911","UBUNTU-CVE-2017-11176","UBUNTU-CVE-2017-14340"],"upstream":["CVE-2017-1000252","CVE-2017-10663","CVE-2017-10911","CVE-2017-11176","CVE-2017-14340","UBUNTU-CVE-2017-1000252","UBUNTU-CVE-2017-10663","UBUNTU-CVE-2017-10911","UBUNTU-CVE-2017-11176","UBUNTU-CVE-2017-14340"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3468-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10663"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10911"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-11176"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-14340"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-1000252"}],"affected":[{"package":{"name":"linux-hwe","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/linux-hwe@4.10.0-38.42~16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.10.0-38.42~16.04.1"}]}],"versions":["4.8.0-36.36~16.04.1","4.8.0-39.42~16.04.1","4.8.0-41.44~16.04.1","4.8.0-42.45~16.04.1","4.8.0-44.47~16.04.1","4.8.0-45.48~16.04.1","4.8.0-46.49~16.04.1","4.8.0-49.52~16.04.1","4.8.0-51.54~16.04.1","4.8.0-52.55~16.04.1","4.8.0-53.56~16.04.1","4.8.0-54.57~16.04.1","4.8.0-56.61~16.04.1","4.8.0-58.63~16.04.1","4.10.0-27.30~16.04.2","4.10.0-28.32~16.04.2","4.10.0-30.34~16.04.1","4.10.0-32.36~16.04.1","4.10.0-33.37~16.04.1","4.10.0-35.39~16.04.1","4.10.0-37.41~16.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"block-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"block-modules-4.10.0-38-generic-lpae-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"crypto-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"crypto-modules-4.10.0-38-generic-lpae-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"dasd-extra-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"dasd-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"fat-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"fat-modules-4.10.0-38-generic-lpae-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"fb-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"firewire-core-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"floppy-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"fs-core-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"fs-core-modules-4.10.0-38-generic-lpae-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"fs-secondary-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"fs-secondary-modules-4.10.0-38-generic-lpae-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"input-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"input-modules-4.10.0-38-generic-lpae-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"ipmi-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"ipmi-modules-4.10.0-38-generic-lpae-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"irda-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"irda-modules-4.10.0-38-generic-lpae-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"kernel-image-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"kernel-image-4.10.0-38-generic-lpae-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"linux-cloud-tools-4.10.0-38-generic"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"linux-cloud-tools-4.10.0-38-lowlatency"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"linux-headers-4.10.0-38"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"linux-headers-4.10.0-38-generic"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"linux-headers-4.10.0-38-generic-lpae"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"linux-headers-4.10.0-38-lowlatency"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"linux-hwe-cloud-tools-4.10.0-38"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"linux-hwe-tools-4.10.0-38"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"linux-hwe-udebs-generic"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"linux-hwe-udebs-generic-lpae"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"linux-image-4.10.0-38-generic"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"linux-image-4.10.0-38-generic-lpae"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"linux-image-4.10.0-38-lowlatency"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"linux-image-extra-4.10.0-38-generic"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"linux-source-4.10.0"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"linux-tools-4.10.0-38-generic"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"linux-tools-4.10.0-38-generic-lpae"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"linux-tools-4.10.0-38-lowlatency"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"md-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"md-modules-4.10.0-38-generic-lpae-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"message-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"mouse-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"mouse-modules-4.10.0-38-generic-lpae-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"multipath-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"multipath-modules-4.10.0-38-generic-lpae-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"nfs-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"nfs-modules-4.10.0-38-generic-lpae-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"nic-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"nic-modules-4.10.0-38-generic-lpae-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"nic-pcmcia-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"nic-shared-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"nic-shared-modules-4.10.0-38-generic-lpae-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"nic-usb-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"nic-usb-modules-4.10.0-38-generic-lpae-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"parport-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"parport-modules-4.10.0-38-generic-lpae-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"pata-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"pcmcia-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"pcmcia-storage-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"plip-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"plip-modules-4.10.0-38-generic-lpae-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"ppp-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"ppp-modules-4.10.0-38-generic-lpae-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"sata-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"sata-modules-4.10.0-38-generic-lpae-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"scsi-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"scsi-modules-4.10.0-38-generic-lpae-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"serial-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"storage-core-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"storage-core-modules-4.10.0-38-generic-lpae-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"usb-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"usb-modules-4.10.0-38-generic-lpae-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"virtio-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"vlan-modules-4.10.0-38-generic-di"},{"binary_version":"4.10.0-38.42~16.04.1","binary_name":"vlan-modules-4.10.0-38-generic-lpae-di"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3468-2.json"}}],"schema_version":"1.7.3"}