Lucene search

K
lenovoLenovoLENOVO:PS500107-NOSID
HistoryJun 08, 2017 - 12:00 a.m.

Lenovo StorSelect DX8200C HyperStore Use-after-free in the IPv6 implementation of the DCCP protocol in the Linux kernel - us

2017-06-0800:00:00
support.lenovo.com
54

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

0.4%

Lenovo Security Advisory: LEN-15183

Potential Impact: Privilege Escalation

Severity: High

**Scope of Impact:**Industry-Wide

**CVE Identifier:**CVE-2017-6074

Summary:

A vulnerability has been identified on the Lenovo StorSelect DX8200C MT 5120 running Cloudian HyperStore v6.1 and earlier. Lenovo StorSelect is a software-defined storage (SDS) solution that runs on Lenovo x86 servers. A use-after-free flaw was found in the way the Linux kernel’s Datagram Congestion Control Protocol (DCCP) implementation freed SKB (socket buffer) resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set on the socket. A local, unprivileged user could use this flaw to alter the kernel memory, allowing them to escalate their privileges on the system.

Mitigation Strategy for Customers (what you should do to protect yourself):

Licensed Lenovo StorSelect DX8200C users should access the Cloudian support portal for more information and to download the fix.

For StorSelect DX8200C Licensed End Users: <https://cloudian-support.force.com/lenovo/5015F00000029ON&gt;

For a complete list of all Lenovo Product Security Advisories, click here.

Revision History:

Revision

|

Date

|

Description

—|—|—

1

|

6/8/2017

|

Initial release

For the most up to date information, please remain current with updates and advisories from Lenovo regarding your equipment and software. The information provided in this advisory is provided on as “as is” basis without any warranty or guarantee of any kind. Lenovo reserves the right to change or update this advisory at any time.

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

0.4%