CVE-2017-6074
Publication date 23 February 2017
Last updated 25 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call.
From the Ubuntu Security Team
Andrey Konovalov discovered a use-after-free vulnerability in the DCCP implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly gain administrative privileges.
Mitigation
Blacklist the dccp ipv[46] autoloading aliases by adding the following lines to /etc/modprobe.d/blacklist-dccp.conf: alias net-pf-2-proto-0-type-6 off alias net-pf-2-proto-33-type-6 off alias net-pf-10-proto-0-type-6 off alias net-pf-10-proto-33-type-6 off
Status
| Package | Ubuntu Release | Status | 
|---|---|---|
| linux | ||
| 18.04 LTS bionic | 
                                Not affected 
                                
                               | |
| 16.04 LTS xenial | 
                                Fixed 4.4.0-64.85 
                                
                               | |
| 14.04 LTS trusty | 
                                Fixed 3.13.0-110.157 
                                
                               | |
| linux-linaro-omap | ||
| 18.04 LTS bionic | Not in release | |
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty | Not in release | |
| linux-linaro-shared | ||
| 18.04 LTS bionic | Not in release | |
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty | Not in release | |
| linux-ti-omap4 | ||
| 18.04 LTS bionic | Not in release | |
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty | Not in release | |
| linux-armadaxp | ||
| 18.04 LTS bionic | Not in release | |
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty | Not in release | |
| linux-flo | ||
| 18.04 LTS bionic | Not in release | |
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty | Not in release | |
| linux-aws | ||
| 18.04 LTS bionic | 
                                Not affected 
                                
                               | |
| 16.04 LTS xenial | 
                                Fixed 4.4.0-1004.13 
                                
                               | |
| 14.04 LTS trusty | 
                                Not affected 
                                
                               | |
| linux-azure | ||
| 18.04 LTS bionic | 
                                Not affected 
                                
                               | |
| 16.04 LTS xenial | 
                                Not affected 
                                
                               | |
| 14.04 LTS trusty | 
                                Not affected 
                                
                               | |
| linux-euclid | ||
| 18.04 LTS bionic | Not in release | |
| 16.04 LTS xenial | 
                                Fixed 4.4.0-9029.31 
                                
                               | |
| 14.04 LTS trusty | Not in release | |
| linux-kvm | ||
| 18.04 LTS bionic | 
                                Not affected 
                                
                               | |
| 16.04 LTS xenial | 
                                Not affected 
                                
                               | |
| 14.04 LTS trusty | Not in release | |
| linux-oem | ||
| 18.04 LTS bionic | 
                                Not affected 
                                
                               | |
| 16.04 LTS xenial | Ignored end of standard support, was needs-triage | |
| 14.04 LTS trusty | Not in release | |
| linux-goldfish | ||
| 18.04 LTS bionic | Not in release | |
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty | Not in release | |
| linux-grouper | ||
| 18.04 LTS bionic | Not in release | |
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty | Not in release | |
| linux-linaro-vexpress | ||
| 18.04 LTS bionic | Not in release | |
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty | Not in release | |
| linux-lts-quantal | ||
| 18.04 LTS bionic | Not in release | |
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty | Not in release | |
| linux-lts-raring | ||
| 18.04 LTS bionic | Not in release | |
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty | Not in release | |
| linux-lts-saucy | ||
| 18.04 LTS bionic | Not in release | |
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty | Not in release | |
| linux-lts-trusty | ||
| 18.04 LTS bionic | Not in release | |
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty | Not in release | |
| linux-lts-utopic | ||
| 18.04 LTS bionic | Not in release | |
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty | Not in release | |
| linux-lts-vivid | ||
| 18.04 LTS bionic | Not in release | |
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty | Not in release | |
| linux-lts-wily | ||
| 18.04 LTS bionic | Not in release | |
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty | Not in release | |
| linux-lts-xenial | ||
| 18.04 LTS bionic | Not in release | |
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty | 
                                Fixed 4.4.0-64.85~14.04.1 
                                
                               | |
| linux-maguro | ||
| 18.04 LTS bionic | Not in release | |
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty | Not in release | |
| linux-mako | ||
| 18.04 LTS bionic | Not in release | |
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty | Not in release | |
| linux-manta | ||
| 18.04 LTS bionic | Not in release | |
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty | Not in release | |
| linux-qcm-msm | ||
| 18.04 LTS bionic | Not in release | |
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty | Not in release | |
| linux-raspi2 | ||
| 18.04 LTS bionic | 
                                Not affected 
                                
                               | |
| 16.04 LTS xenial | 
                                Fixed 4.4.0-1044.51 
                                
                               | |
| 14.04 LTS trusty | Not in release | |
| linux-azure-edge | ||
| 18.04 LTS bionic | 
                                Not affected 
                                
                               | |
| 16.04 LTS xenial | 
                                Not affected 
                                
                               | |
| 14.04 LTS trusty | Not in release | |
| linux-gcp | ||
| 18.04 LTS bionic | 
                                Not affected 
                                
                               | |
| 16.04 LTS xenial | 
                                Not affected 
                                
                               | |
| 14.04 LTS trusty | Not in release | |
| linux-gke | ||
| 18.04 LTS bionic | Not in release | |
| 16.04 LTS xenial | 
                                Not affected 
                                
                               | |
| 14.04 LTS trusty | Not in release | |
| linux-hwe | ||
| 18.04 LTS bionic | 
                                Not affected 
                                
                               | |
| 16.04 LTS xenial | 
                                Fixed 4.8.0-39.42~16.04.1 
                                
                               | |
| 14.04 LTS trusty | Not in release | |
| linux-hwe-edge | ||
| 18.04 LTS bionic | 
                                Not affected 
                                
                               | |
| 16.04 LTS xenial | 
                                Fixed 4.8.0-39.42~16.04.1 
                                
                               | |
| 14.04 LTS trusty | Not in release | |
| linux-snapdragon | ||
| 18.04 LTS bionic | 
                                Not affected 
                                
                               | |
| 16.04 LTS xenial | 
                                Fixed 4.4.0-1048.52 
                                
                               | |
| 14.04 LTS trusty | Not in release | |
Severity score breakdown
| Parameter | Value | 
|---|---|
| Base score |  | 
| Attack vector | Local | 
| Attack complexity | Low | 
| Privileges required | Low | 
| User interaction | None | 
| Scope | Unchanged | 
| Confidentiality | High | 
| Integrity impact | High | 
| Availability impact | High | 
| Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | 
References
Related Ubuntu Security Notices (USN)
- USN-3208-1
- Linux kernel vulnerabilities
- 22 February 2017
- USN-3208-2
- Linux kernel (Xenial HWE) vulnerabilities
- 22 February 2017
- USN-3207-1
- Linux kernel vulnerabilities
- 22 February 2017
- USN-3206-1
- Linux kernel vulnerabilities
- 22 February 2017
- USN-3209-1
- Linux kernel vulnerabilities
- 22 February 2017
- USN-3207-2
- Linux kernel (Trusty HWE) vulnerabilities
- 22 February 2017
Other references
- https://patchwork.ozlabs.org/patch/728808/
- https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6074
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5edabca9d4cff7f1f2b68f0bac55ef99d9798ba4
- http://www.openwall.com/lists/oss-security/2017/02/26/2
- https://www.cve.org/CVERecord?id=CVE-2017-6074