vulnerability
Ubuntu: (Multiple Advisories) (CVE-2017-6348): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:N/C:N/I:N/A:C) | 2017-03-01 | 2017-07-01 | 2025-04-25 |
Description
It was discovered that a use-after-free flaw existed in the filesystem
encryption subsystem in the Linux kernel. A local attacker could use this
to cause a denial of service (system crash). (CVE-2017-7374)
Andrey Konovalov discovered an out-of-bounds access in the IPv6 Generic
Routing Encapsulation (GRE) tunneling implementation in the Linux kernel.
An attacker could use this to possibly expose sensitive information.
(CVE-2017-5897)
Andrey Konovalov discovered that the IPv4 implementation in the Linux
kernel did not properly handle invalid IP options in some situations. An
attacker could use this to cause a denial of service or possibly execute
arbitrary code. (CVE-2017-5970)
Gareth Evans discovered that the shm IPC subsystem in the Linux kernel did
not properly restrict mapping page zero. A local privileged attacker could
use this to execute arbitrary code. (CVE-2017-5669)
Alexander Popov discovered that a race condition existed in the Stream
Control Transmission Protocol (SCTP) implementation in the Linux kernel. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2017-5986)
Dmitry Vyukov discovered that the Linux kernel did not properly handle TCP
packets with the URG flag. A remote attacker could use this to cause a
denial of service. (CVE-2017-6214)
Andrey Konovalov discovered that the LLC subsytem in the Linux kernel did
not properly set up a destructor in certain situations. A local attacker
could use this to cause a denial of service (system crash). (CVE-2017-6345)
It was discovered that a race condition existed in the AF_PACKET handling
code in the Linux kernel. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2017-6346)
Andrey Konovalov discovered that the IP layer in the Linux kernel made
improper assumptions about internal data layout when performing checksums.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2017-6347)
Dmitry Vyukov discovered race conditions in the Infrared (IrDA) subsystem
in the Linux kernel. A local attacker could use this to cause a denial of
service (deadlock). (CVE-2017-6348)
Solution(s)
References
- CVE-2017-6348
- https://attackerkb.com/topics/CVE-2017-6348
- DEBIAN-DLA-849-1
- DEBIAN-DSA-3804
- NVD-CVE-2017-6348
- UBUNTU-USN-3208-1
- UBUNTU-USN-3208-2
- UBUNTU-USN-3234-1
- UBUNTU-USN-3234-2
- UBUNTU-USN-3265-1
- UBUNTU-USN-3265-2
- UBUNTU-USN-3312-1
- UBUNTU-USN-3312-2
- UBUNTU-USN-3314-1
- UBUNTU-USN-3361-1
- UBUNTU-USN-3420-1
- UBUNTU-USN-3420-2
- UBUNTU-USN-3469-1
- UBUNTU-USN-3469-2
- UBUNTU-USN-3485-1
- UBUNTU-USN-3485-2
- UBUNTU-USN-3485-3
- UBUNTU-USN-3487-1
- UBUNTU-USN-3507-1
- UBUNTU-USN-3509-1
- UBUNTU-USN-3509-2
- UBUNTU-USN-3617-1
- UBUNTU-USN-3617-2
- UBUNTU-USN-3617-3
- UBUNTU-USN-3619-1
- UBUNTU-USN-3619-2
- UBUNTU-USN-3631-1
- UBUNTU-USN-3631-2
- UBUNTU-USN-3676-1
- UBUNTU-USN-3676-2
- UBUNTU-USN-3677-1
- UBUNTU-USN-3677-2
- UBUNTU-USN-3678-1
- UBUNTU-USN-3678-2
- UBUNTU-USN-3678-3
- UBUNTU-USN-3678-4
- UBUNTU-USN-3695-1
- UBUNTU-USN-3695-2
- UBUNTU-USN-3696-1
- UBUNTU-USN-3696-2
- UBUNTU-USN-3752-1
- UBUNTU-USN-3752-2
- UBUNTU-USN-3752-3
- UBUNTU-USN-3753-1
- UBUNTU-USN-3753-2
- UBUNTU-USN-3754-1
- UBUNTU-USN-3871-1
- UBUNTU-USN-3871-3
- UBUNTU-USN-3871-4
- UBUNTU-USN-3871-5
- UBUNTU-USN-4486-1
- UBUNTU-USN-4904-1

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.