First published: Tue Nov 21 2017(Updated: )
USN-3484-1 fixed vulnerabilities in the Linux kernel for Ubuntu 17.04. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 17.04 for Ubuntu 16.04 LTS. It was discovered that the KVM subsystem in the Linux kernel did not properly keep track of nested levels in guest page tables. A local attacker in a guest VM could use this to cause a denial of service (host OS crash) or possibly execute arbitrary code in the host OS.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.10.0-40-generic | <4.10.0-40.44~16.04.1 | 4.10.0-40.44~16.04.1 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.04 | |
All of | ||
ubuntu/linux-image-4.10.0-40-generic-lpae | <4.10.0-40.44~16.04.1 | 4.10.0-40.44~16.04.1 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.04 | |
All of | ||
ubuntu/linux-image-4.10.0-40-lowlatency | <4.10.0-40.44~16.04.1 | 4.10.0-40.44~16.04.1 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-3484-2 is moderate.
To fix USN-3484-2, upgrade your Linux kernel to version 4.10.0-40.44~16.04.1 or later.
The affected software for USN-3484-2 is Ubuntu 16.04 LTS with Linux kernel version 4.10.0-40.44~16.04.1 or earlier.
You can find more information about USN-3484-2 at the following references: [CVE-2017-12188](https://ubuntu.com/security/CVE-2017-12188), [USN-3487-1](https://ubuntu.com/security/notices/USN-3487-1), [USN-3484-3](https://ubuntu.com/security/notices/USN-3484-3).