Rapid7 Vulnerability & Exploit Database

Ubuntu: (Multiple Advisories) (CVE-2017-9074): Linux kernel (Trusty HWE) vulnerabilities

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Ubuntu: (Multiple Advisories) (CVE-2017-9074): Linux kernel (Trusty HWE) vulnerabilities

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
05/19/2017
Created
07/25/2018
Added
06/20/2017
Modified
08/25/2021

Description

The IPv6 fragmentation implementation in the Linux kernel through 4.11.1 does not consider that the nexthdr field may be associated with an invalid option, which allows local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls.

Solution(s)

  • ubuntu-upgrade-linux-image-3-13-0-123-generic
  • ubuntu-upgrade-linux-image-3-13-0-123-generic-lpae
  • ubuntu-upgrade-linux-image-3-13-0-123-lowlatency
  • ubuntu-upgrade-linux-image-3-13-0-123-powerpc-e500
  • ubuntu-upgrade-linux-image-3-13-0-123-powerpc-e500mc
  • ubuntu-upgrade-linux-image-3-13-0-123-powerpc-smp
  • ubuntu-upgrade-linux-image-3-13-0-123-powerpc64-emb
  • ubuntu-upgrade-linux-image-3-13-0-123-powerpc64-smp
  • ubuntu-upgrade-linux-image-3-13-0-125-generic
  • ubuntu-upgrade-linux-image-3-13-0-125-generic-lpae
  • ubuntu-upgrade-linux-image-4-10-0-1010-raspi2
  • ubuntu-upgrade-linux-image-4-10-0-26-generic
  • ubuntu-upgrade-linux-image-4-10-0-26-generic-lpae
  • ubuntu-upgrade-linux-image-4-10-0-26-lowlatency
  • ubuntu-upgrade-linux-image-4-4-0-1018-gke
  • ubuntu-upgrade-linux-image-4-4-0-1022-aws
  • ubuntu-upgrade-linux-image-4-4-0-1061-raspi2
  • ubuntu-upgrade-linux-image-4-4-0-1063-snapdragon
  • ubuntu-upgrade-linux-image-4-4-0-83-generic
  • ubuntu-upgrade-linux-image-4-4-0-83-generic-lpae
  • ubuntu-upgrade-linux-image-4-4-0-83-lowlatency
  • ubuntu-upgrade-linux-image-4-4-0-83-powerpc-e500mc
  • ubuntu-upgrade-linux-image-4-4-0-83-powerpc-smp
  • ubuntu-upgrade-linux-image-4-4-0-83-powerpc64-emb
  • ubuntu-upgrade-linux-image-4-4-0-83-powerpc64-smp
  • ubuntu-upgrade-linux-image-4-8-0-1042-raspi2
  • ubuntu-upgrade-linux-image-4-8-0-58-generic
  • ubuntu-upgrade-linux-image-4-8-0-58-generic-lpae
  • ubuntu-upgrade-linux-image-4-8-0-58-lowlatency
  • ubuntu-upgrade-linux-image-4-8-0-58-powerpc-e500mc
  • ubuntu-upgrade-linux-image-4-8-0-58-powerpc-smp
  • ubuntu-upgrade-linux-image-4-8-0-58-powerpc64-emb
  • ubuntu-upgrade-linux-image-aws
  • ubuntu-upgrade-linux-image-generic
  • ubuntu-upgrade-linux-image-generic-hwe-16-04
  • ubuntu-upgrade-linux-image-generic-lpae
  • ubuntu-upgrade-linux-image-generic-lpae-hwe-16-04
  • ubuntu-upgrade-linux-image-generic-lpae-lts-trusty
  • ubuntu-upgrade-linux-image-generic-lpae-lts-xenial
  • ubuntu-upgrade-linux-image-generic-lts-trusty
  • ubuntu-upgrade-linux-image-generic-lts-xenial
  • ubuntu-upgrade-linux-image-gke
  • ubuntu-upgrade-linux-image-lowlatency
  • ubuntu-upgrade-linux-image-lowlatency-hwe-16-04
  • ubuntu-upgrade-linux-image-lowlatency-lts-xenial
  • ubuntu-upgrade-linux-image-powerpc-e500
  • ubuntu-upgrade-linux-image-powerpc-e500mc
  • ubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenial
  • ubuntu-upgrade-linux-image-powerpc-smp
  • ubuntu-upgrade-linux-image-powerpc-smp-lts-xenial
  • ubuntu-upgrade-linux-image-powerpc64-emb
  • ubuntu-upgrade-linux-image-powerpc64-emb-lts-xenial
  • ubuntu-upgrade-linux-image-powerpc64-smp
  • ubuntu-upgrade-linux-image-powerpc64-smp-lts-xenial
  • ubuntu-upgrade-linux-image-raspi2
  • ubuntu-upgrade-linux-image-snapdragon
  • ubuntu-upgrade-linux-image-virtual

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;