vulnerability
Ubuntu: (Multiple Advisories) (CVE-2017-9077): Linux kernel vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | May 19, 2017 | Jun 20, 2017 | Mar 27, 2026 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
May 19, 2017
Added
Jun 20, 2017
Modified
Mar 27, 2026
Description
The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.
Solutions
ubuntu-upgrade-linux-image-3-13-0-123-genericubuntu-upgrade-linux-image-3-13-0-123-generic-lpaeubuntu-upgrade-linux-image-3-13-0-123-lowlatencyubuntu-upgrade-linux-image-3-13-0-123-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-123-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-123-powerpc-smpubuntu-upgrade-linux-image-3-13-0-123-powerpc64-embubuntu-upgrade-linux-image-3-13-0-123-powerpc64-smpubuntu-upgrade-linux-image-4-10-0-1010-raspi2ubuntu-upgrade-linux-image-4-10-0-26-genericubuntu-upgrade-linux-image-4-10-0-26-generic-lpaeubuntu-upgrade-linux-image-4-10-0-26-lowlatencyubuntu-upgrade-linux-image-4-4-0-1018-gkeubuntu-upgrade-linux-image-4-4-0-1022-awsubuntu-upgrade-linux-image-4-4-0-1061-raspi2ubuntu-upgrade-linux-image-4-4-0-1063-snapdragonubuntu-upgrade-linux-image-4-4-0-83-genericubuntu-upgrade-linux-image-4-4-0-83-generic-lpaeubuntu-upgrade-linux-image-4-4-0-83-lowlatencyubuntu-upgrade-linux-image-4-4-0-83-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-83-powerpc-smpubuntu-upgrade-linux-image-4-4-0-83-powerpc64-embubuntu-upgrade-linux-image-4-4-0-83-powerpc64-smpubuntu-upgrade-linux-image-4-8-0-1042-raspi2ubuntu-upgrade-linux-image-4-8-0-58-genericubuntu-upgrade-linux-image-4-8-0-58-generic-lpaeubuntu-upgrade-linux-image-4-8-0-58-lowlatencyubuntu-upgrade-linux-image-4-8-0-58-powerpc-e500mcubuntu-upgrade-linux-image-4-8-0-58-powerpc-smpubuntu-upgrade-linux-image-4-8-0-58-powerpc64-embubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-lts-trustyubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-trustyubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-powerpc-e500ubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-virtual
References
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.