vulnerability

Ubuntu: (Multiple Advisories) (CVE-2017-9074): Linux kernel vulnerabilities

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
May 19, 2017
Added
Jun 20, 2017
Modified
Mar 27, 2026

Description

The IPv6 fragmentation implementation in the Linux kernel through 4.11.1 does not consider that the nexthdr field may be associated with an invalid option, which allows local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls.

Solutions

ubuntu-upgrade-linux-image-3-13-0-123-genericubuntu-upgrade-linux-image-3-13-0-123-generic-lpaeubuntu-upgrade-linux-image-3-13-0-123-lowlatencyubuntu-upgrade-linux-image-3-13-0-123-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-123-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-123-powerpc-smpubuntu-upgrade-linux-image-3-13-0-123-powerpc64-embubuntu-upgrade-linux-image-3-13-0-123-powerpc64-smpubuntu-upgrade-linux-image-3-13-0-125-genericubuntu-upgrade-linux-image-3-13-0-125-generic-lpaeubuntu-upgrade-linux-image-4-10-0-1010-raspi2ubuntu-upgrade-linux-image-4-10-0-26-genericubuntu-upgrade-linux-image-4-10-0-26-generic-lpaeubuntu-upgrade-linux-image-4-10-0-26-lowlatencyubuntu-upgrade-linux-image-4-4-0-1018-gkeubuntu-upgrade-linux-image-4-4-0-1022-awsubuntu-upgrade-linux-image-4-4-0-1061-raspi2ubuntu-upgrade-linux-image-4-4-0-1063-snapdragonubuntu-upgrade-linux-image-4-4-0-83-genericubuntu-upgrade-linux-image-4-4-0-83-generic-lpaeubuntu-upgrade-linux-image-4-4-0-83-lowlatencyubuntu-upgrade-linux-image-4-4-0-83-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-83-powerpc-smpubuntu-upgrade-linux-image-4-4-0-83-powerpc64-embubuntu-upgrade-linux-image-4-4-0-83-powerpc64-smpubuntu-upgrade-linux-image-4-8-0-1042-raspi2ubuntu-upgrade-linux-image-4-8-0-58-genericubuntu-upgrade-linux-image-4-8-0-58-generic-lpaeubuntu-upgrade-linux-image-4-8-0-58-lowlatencyubuntu-upgrade-linux-image-4-8-0-58-powerpc-e500mcubuntu-upgrade-linux-image-4-8-0-58-powerpc-smpubuntu-upgrade-linux-image-4-8-0-58-powerpc64-embubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-lts-trustyubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-trustyubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-powerpc-e500ubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-virtual

References

    Title
    Rapid7 Labs

    2026 Global Threat Landscape Report

    The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.