Lenovo StorSelect DX8200C HyperStore Use-after-free in the IPv6 implementation of the DCCP protocol in the Linux kernel - us


**Lenovo Security Advisory**: LEN-15183 **Potential Impact:** Privilege Escalation **Severity:** High **Scope of Impact: **Industry-Wide **CVE Identifier: **CVE-2017-6074 **Summary:** A vulnerability has been identified on the Lenovo StorSelect DX8200C MT 5120 running Cloudian HyperStore v6.1 and earlier. Lenovo StorSelect is a software-defined storage (SDS) solution that runs on Lenovo x86 servers. A use-after-free flaw was found in the way the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation freed SKB (socket buffer) resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set on the socket. A local, unprivileged user could use this flaw to alter the kernel memory, allowing them to escalate their privileges on the system. **Mitigation Strategy for Customers (what you should do to protect yourself):** Licensed Lenovo StorSelect DX8200C users should access the Cloudian support portal for more information and to download the fix. For StorSelect DX8200C Licensed End Users: <https://cloudian-support.force.com/lenovo/5015F00000029ON> For a complete list of all Lenovo Product Security Advisories, click [here](<https://support.lenovo.com//product_security/home>). **Revision History:** **Revision** | **Date** | **Description** ---|---|--- 1 | 6/8/2017 | Initial release For the most up to date information, please remain current with updates and advisories from Lenovo regarding your equipment and software. The information provided in this advisory is provided on as “as is” basis without any warranty or guarantee of any kind. Lenovo reserves the right to change or update this advisory at any time.