First published: Tue Feb 28 2017(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux operating<br>system.<br>Security Fix(es):<br><li> A use-after-free flaw was found in the way the Linux kernel's Datagram</li> Congestion Control Protocol (DCCP) implementation freed SKB (socket buffer)<br>resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set<br>on the socket. A local, unprivileged user could use this flaw to alter the<br>kernel memory, allowing them to escalate their privileges on the system.<br>(CVE-2017-6074, Important)<br><li> It was found that the Linux kernel's Datagram Congestion Control Protocol</li> (DCCP) implementation used the IPv4-only inet_sk_rebuild_header() function for<br>both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A<br>remote attacker could use this flaw to crash the system. (CVE-2017-2634,<br>Moderate)<br>Important: This update disables the DCCP kernel module at load time by using the<br>kernel module blacklist method. The module is disabled in an attempt to reduce<br>further exposure to additional issues. (BZ#1426311)<br>Red Hat would like to thank Andrey Konovalov (Google) for reporting<br>CVE-2017-6074. The CVE-2017-2634 issue was discovered by Wade Mealing (Red Hat<br>Product Security).<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <2.6.18-238.58.1.el5 | 2.6.18-238.58.1.el5 |
redhat/kernel | <2.6.18-238.58.1.el5 | 2.6.18-238.58.1.el5 |
redhat/kernel-debug | <2.6.18-238.58.1.el5 | 2.6.18-238.58.1.el5 |
redhat/kernel-debug-debuginfo | <2.6.18-238.58.1.el5 | 2.6.18-238.58.1.el5 |
redhat/kernel-debug-devel | <2.6.18-238.58.1.el5 | 2.6.18-238.58.1.el5 |
redhat/kernel-debuginfo | <2.6.18-238.58.1.el5 | 2.6.18-238.58.1.el5 |
redhat/kernel-debuginfo-common | <2.6.18-238.58.1.el5 | 2.6.18-238.58.1.el5 |
redhat/kernel-devel | <2.6.18-238.58.1.el5 | 2.6.18-238.58.1.el5 |
redhat/kernel-doc | <2.6.18-238.58.1.el5 | 2.6.18-238.58.1.el5 |
redhat/kernel-headers | <2.6.18-238.58.1.el5 | 2.6.18-238.58.1.el5 |
redhat/kernel-xen | <2.6.18-238.58.1.el5 | 2.6.18-238.58.1.el5 |
redhat/kernel-xen-debuginfo | <2.6.18-238.58.1.el5 | 2.6.18-238.58.1.el5 |
redhat/kernel-xen-devel | <2.6.18-238.58.1.el5 | 2.6.18-238.58.1.el5 |
redhat/kernel-debug | <2.6.18-238.58.1.el5 | 2.6.18-238.58.1.el5 |
redhat/kernel-debug-debuginfo | <2.6.18-238.58.1.el5 | 2.6.18-238.58.1.el5 |
redhat/kernel-debug-devel | <2.6.18-238.58.1.el5 | 2.6.18-238.58.1.el5 |
redhat/kernel-debuginfo | <2.6.18-238.58.1.el5 | 2.6.18-238.58.1.el5 |
redhat/kernel-debuginfo-common | <2.6.18-238.58.1.el5 | 2.6.18-238.58.1.el5 |
redhat/kernel-devel | <2.6.18-238.58.1.el5 | 2.6.18-238.58.1.el5 |
redhat/kernel-headers | <2.6.18-238.58.1.el5 | 2.6.18-238.58.1.el5 |
redhat/kernel-xen | <2.6.18-238.58.1.el5 | 2.6.18-238.58.1.el5 |
redhat/kernel-xen-debuginfo | <2.6.18-238.58.1.el5 | 2.6.18-238.58.1.el5 |
redhat/kernel-xen-devel | <2.6.18-238.58.1.el5 | 2.6.18-238.58.1.el5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.