CVE-2017-6074 log
Source |
|
Severity | High |
Remote | No |
Type | Privilege escalation |
Description | A use-after-free vulnerability has been discovered in the DCCP implementation in the Linux kernel. The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state. A local unprivileged user could use this flaw to alter the kernel memory, allowing them to escalate their privileges on the system via an application that makes an IPV6_RECVPKTINFO setsockopt system call. |
Group | Package | Affected | Fixed | Severity | Status | Ticket |
---|---|---|---|---|---|---|
AVG-189 | linux-lts | 4.4.50-1 | 4.9.13-1 | High | Fixed | |
AVG-186 | linux-zen | 4.9.8-1 | 4.9.11-2 | High | Fixed | |
AVG-178 | linux | 4.9.8-1 | 4.9.11-1 | High | Fixed |
Date | Advisory | Group | Package | Severity | Type |
---|---|---|---|---|---|
22 Feb 2017 | ASA-201702-18 | AVG-186 | linux-zen | High | multiple issues |
22 Feb 2017 | ASA-201702-17 | AVG-178 | linux | High | multiple issues |
References |
---|
https://github.com/torvalds/linux/commit/5edabca9d4cff7f1f2b68f0bac55ef99d9798ba4 https://patchwork.ozlabs.org/patch/728808/ |