First published: Tue May 09 2017(Updated: )
The rhev-hypervisor package provides a Red Hat Enterprise Virtualization<br>Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor<br>is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes<br>everything necessary to run and manage virtual machines: A subset of the<br>Red Hat Enterprise Linux operating environment and the Red Hat Enterprise<br>Virtualization Agent.<br>Security Fix(es):<br><li> A use-after-free flaw was found in the way the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation freed SKB (socket buffer) resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set on the socket. A local, unprivileged user could use this flaw to alter the kernel memory, allowing them to escalate their privileges on the system. (CVE-2017-6074)</li> Red Hat would like to thank Andrey Konovalov (Google) for reporting this issue.<br>Note: Red Hat Enterprise Virtualization Hypervisor is only available for<br>the Intel 64 and AMD64 architectures with virtualization extensions.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rhev-hypervisor7 | <7.3-20170425.0.el7e | 7.3-20170425.0.el7e |
redhat/rhev-hypervisor7 | <7.3-20170425.0.el6e | 7.3-20170425.0.el6e |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2017:1209 is classified as important.
To fix RHSA-2017:1209, update the rhev-hypervisor package to the latest version available for your system.
RHSA-2017:1209 affects rhev-hypervisor versions up to 7.3-20170425.0.el7e and 7.3-20170425.0.el6e.
The main impact of RHSA-2017:1209 involves security vulnerabilities that could affect the stability and security of the hypervisor environment.
There are no specific workarounds for RHSA-2017:1209; updating the package is recommended to address the vulnerabilities.