vulnerability
Ubuntu: (Multiple Advisories) (CVE-2017-6347): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | 2017-03-01 | 2017-07-01 | 2025-04-25 |
Description
It was discovered that a use-after-free flaw existed in the filesystem
encryption subsystem in the Linux kernel. A local attacker could use this
to cause a denial of service (system crash). (CVE-2017-7374)
Andrey Konovalov discovered an out-of-bounds access in the IPv6 Generic
Routing Encapsulation (GRE) tunneling implementation in the Linux kernel.
An attacker could use this to possibly expose sensitive information.
(CVE-2017-5897)
Andrey Konovalov discovered that the IPv4 implementation in the Linux
kernel did not properly handle invalid IP options in some situations. An
attacker could use this to cause a denial of service or possibly execute
arbitrary code. (CVE-2017-5970)
Gareth Evans discovered that the shm IPC subsystem in the Linux kernel did
not properly restrict mapping page zero. A local privileged attacker could
use this to execute arbitrary code. (CVE-2017-5669)
Alexander Popov discovered that a race condition existed in the Stream
Control Transmission Protocol (SCTP) implementation in the Linux kernel. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2017-5986)
Dmitry Vyukov discovered that the Linux kernel did not properly handle TCP
packets with the URG flag. A remote attacker could use this to cause a
denial of service. (CVE-2017-6214)
Andrey Konovalov discovered that the LLC subsytem in the Linux kernel did
not properly set up a destructor in certain situations. A local attacker
could use this to cause a denial of service (system crash). (CVE-2017-6345)
It was discovered that a race condition existed in the AF_PACKET handling
code in the Linux kernel. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2017-6346)
Andrey Konovalov discovered that the IP layer in the Linux kernel made
improper assumptions about internal data layout when performing checksums.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2017-6347)
Dmitry Vyukov discovered race conditions in the Infrared (IrDA) subsystem
in the Linux kernel. A local attacker could use this to cause a denial of
service (deadlock). (CVE-2017-6348)
Solution(s)
References
- CVE-2017-6347
- https://attackerkb.com/topics/CVE-2017-6347
- NVD-CVE-2017-6347
- UBUNTU-USN-3208-1
- UBUNTU-USN-3208-2
- UBUNTU-USN-3234-1
- UBUNTU-USN-3234-2
- UBUNTU-USN-3265-1
- UBUNTU-USN-3265-2
- UBUNTU-USN-3291-1
- UBUNTU-USN-3291-2
- UBUNTU-USN-3291-3
- UBUNTU-USN-3293-1
- UBUNTU-USN-3312-1
- UBUNTU-USN-3312-2
- UBUNTU-USN-3314-1
- UBUNTU-USN-3345-1
- UBUNTU-USN-3358-1
- UBUNTU-USN-3359-1
- UBUNTU-USN-3360-1
- UBUNTU-USN-3360-2
- UBUNTU-USN-3361-1
- UBUNTU-USN-3364-1
- UBUNTU-USN-3364-2
- UBUNTU-USN-3364-3
- UBUNTU-USN-3381-1
- UBUNTU-USN-3381-2
- UBUNTU-USN-3406-1
- UBUNTU-USN-3406-2
- UBUNTU-USN-3422-1
- UBUNTU-USN-3422-2
- UBUNTU-USN-3583-1
- UBUNTU-USN-3583-2
- UBUNTU-USN-3754-1
- UBUNTU-USN-4904-1

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.