CVE-2017-6074 log
| Source | 
							
  | 
					
| Severity | High | 
| Remote | No | 
| Type | Privilege escalation | 
| Description | A use-after-free vulnerability has been discovered in the DCCP implementation in the Linux kernel. The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state. A local unprivileged user could use this flaw to alter the kernel memory, allowing them to escalate their privileges on the system via an application that makes an IPV6_RECVPKTINFO setsockopt system call.  | 
					
| Group | Package | Affected | Fixed | Severity | Status | Ticket | 
|---|---|---|---|---|---|---|
| AVG-189 | linux-lts | 4.4.50-1 | 4.9.13-1 | High | Fixed | |
| AVG-186 | linux-zen | 4.9.8-1 | 4.9.11-2 | High | Fixed | |
| AVG-178 | linux | 4.9.8-1 | 4.9.11-1 | High | Fixed | 
| Date | Advisory | Group | Package | Severity | Type | 
|---|---|---|---|---|---|
| 22 Feb 2017 | ASA-201702-18 | AVG-186 | linux-zen | High | multiple issues | 
| 22 Feb 2017 | ASA-201702-17 | AVG-178 | linux | High | multiple issues | 
| References | 
|---|
https://github.com/torvalds/linux/commit/5edabca9d4cff7f1f2b68f0bac55ef99d9798ba4 https://patchwork.ozlabs.org/patch/728808/  |